Abstract Penetration testing has been the point of this course. Performing a live penetration test against a...
Abstract In anti-forensics attackers attempt to erase or disguise the traces of their intrusion and try to...
I’m ugly, bald, old, and fat. Given the aforementioned I can do little about the first three...
It has been over a month since I updated you on the garden! In those weeks, we...
A couple of thing you should know about me. First, I am in the process of completing...
Recently it was brought to my attention that Raytheon was seeking Cyber Warriors in answer to Presidents...
Abstract In this week’s lab we will analyze target hosts and choose exploit tools that will exploit...
Abstract When performing a penetration test on a system, after gathering all the information that you can,...
Abstract The purpose of this exercise is to compromise three virtual hosts using primarily passive reconnaissance and...
Abstract Making use of automated exploit tools to attack a system is not a new topic. It...
Abstract The purpose of lab 6 is to build upon the previous labs, and this week using...
Abstract Within this lab it continues to build upon the previous labs, and this week we discuss...
Abstract Securing a computer can be a daunting task. To aid in hardening a computer, there are...