A couple of thing you should know about me. First, I am in the process of completing...
Recently it was brought to my attention that Raytheon was seeking Cyber Warriors in answer to Presidents...
Abstract In this week’s lab we will analyze target hosts and choose exploit tools that will exploit...
Abstract When performing a penetration test on a system, after gathering all the information that you can,...
Abstract The purpose of this exercise is to compromise three virtual hosts using primarily passive reconnaissance and...
Abstract Making use of automated exploit tools to attack a system is not a new topic. It...
Abstract The purpose of lab 6 is to build upon the previous labs, and this week using...
Abstract Within this lab it continues to build upon the previous labs, and this week we discuss...
Abstract Securing a computer can be a daunting task. To aid in hardening a computer, there are...
Abstract The purpose of this exercise is to discover usable attack methods by reverse engineering security documents....
Abstract Based on all of the literature provided in previous labs, performing a penetration test is all...
Abstract This lab will allow us to gain an understanding of the reverse engineering process. In this...
It looks like the Department of Defense (DOD) is going to create a cyber warfare command that...