Seeing this meme roll through the Web 2.0 sphere as shocked and horrified stories of adult children...
How do you wage cyber warfare? How do you make a world wide reach? What does it...
Abstract The focus of this lab is security vulnerabilities. Specifically, how do system administrators know that there...
Abstract In lab four, this group is researching vulnerabilities and exploits. In this lab the group learns...
Abstract The purpose of this exercise is to evaluate the concept of a security ‘exploit,’ both by...
Abstract In this lab we will be researching exploits and testing to see if they actually work...
ABSTRACT This lab will build on the research and findings from the previous labs. This lab will...
Want to put a deep crimp in cyber warfare capability of foreign nations? Do you have a...
With this ten part series I wanted to get some ideas down and hopefully start some discussion....
Abstract Unlike the last lab where we analyzed different means of actively retrieving information from a network,...
Abstract The purpose of this exercise was to examine the role, application, and concerns associated with the...
Abstract The act of performing network reconnaissance can mean the difference between a successful penetration test, and...
Abstract The first part of the lab is to research passive reconnaissance tools and how they operate. The...