Abstract There is a fine line in securing a system and maintaining the usability of that system....
Abstract The purpose of this exercise is to emulate a realistic attack/defense scenario in a virtual test...
Abstract Penetration testing has been the point of this course. Performing a live penetration test against a...
Abstract In anti-forensics attackers attempt to erase or disguise the traces of their intrusion and try to...
I’m ugly, bald, old, and fat. Given the aforementioned I can do little about the first three...
It has been over a month since I updated you on the garden! In those weeks, we...
A couple of thing you should know about me. First, I am in the process of completing...
Recently it was brought to my attention that Raytheon was seeking Cyber Warriors in answer to Presidents...
Abstract In this week’s lab we will analyze target hosts and choose exploit tools that will exploit...
Abstract When performing a penetration test on a system, after gathering all the information that you can,...
Abstract The purpose of this exercise is to compromise three virtual hosts using primarily passive reconnaissance and...
Abstract Making use of automated exploit tools to attack a system is not a new topic. It...
Abstract The purpose of lab 6 is to build upon the previous labs, and this week using...