02/05/2024 cracking WPA and WPA2 wifi passwords using aircrack-ng! Check out this tutorial on how I cracked WPA and WPA2 wifi passwords using aircrack-ng!
02/05/2024 John The Ripper Password Brute Force Audit The process of brute force attack is based on attempting all possible patterns of characters based on length. The longer you wait while the brute force attack continues, the longer and more complex passwords will be cracked by John the Ripper
02/04/2024 Web Vulnerability Scanning Let's do some web service vulnerability scanning! Using:niktowapitiNmapQualys SSL labspentest tools scannerlegion
02/03/2024 Scanning for legacy systems Scanning a company server network to detect the presence of hosts and determine their OS versions.After my scan, I will use the Metasploit Framework to refine the OS determinations.Lastly, I research to determine the end-of-support timeframe for each identified OS.
09/13/2023 Unauthorized SSH login to an Apache server Due to the misconfiguration and open exposure of sensitive data. I was able to get access to the server.
09/06/2023 Intro To Malware The beginning of many malware analysis articles. Here we focus on static analysis and common tools the cyber security field uses to conduct investigations.
09/04/2023 Log Training A small, yet effective self training on SOC Logs, folowed up by a password list creation from a web crawling tool, targeted against my own website..
05/26/2023 PHP Reverse Shell execution with Privilege escalation Obtaining root access on an out-of-date Apache system. I used a reverse shell connection with privilege escalation. Followed by a small Penetration test report at the end of this article
04/10/2023 Acquiring Digital Forensics Evidence Finding, isolating, and using digital forensics to find a malicious phishing email that contained a URL to downloadable malware!
03/31/2023 Building a business environment Working in teams of 4, we build a network and implemented servers with configurations, firewalls, domains, and security implementations
03/30/2023 TryHackMe Write-Up (Bounty Hunther) Using network scanning tools to find a unsecured port on a network, finding clues, and using a brute forcing password tool called HYDRA to get access to a user. Lastly, working my way up to root, with escalating my privileges!
03/28/2023 TryHackMe CTF writeup 'Source' Using tools to find a back door vulnerability on a web-based Target. And getting full control
03/17/2023 Ettercap and ARP poisoning conducting a man-in-the-middle attack using Kali with ettercap and ARP poisoning