Crypto

Blog Articles

Ethical Hacking - Demo Hacking WiFi

 

Hi peeps,

This is my demo about Wi-Fi Hacking.

I'll show you what tools to use, what kind of password lists exist and how many characters will or will not keep you save from attacking.

Please forgive my stuttering as English is not my native language. I did the best I could (several times).

 

 

 

Hacking Demo MS17 010 EternalBlue SMB Exploit - What can you do and what must be done

Hi, I'm Martijn and will show you the EternalBlue SMB exploit.


This is a critical vulnerability in the SMB Server.
I'm going to show you this in this demo.

Not all people have developed a Cyber Security / Infosec mindset.
As the results will show you people do not apply best practices.

Allot of people don't patch
Allot of people don't secure their devices
Most people do not monitor their systems.

So let's talk about shodan results.

SOC On A Budget SMB MittreAttack Checker InfoSec PS Security SysMon.ps1

SOC on a Budget - Small Business Companies

 


MittreAttackCheckerInfoSecPSSecuritySysMon.ps1 

 


- Event log threat hunting based on Mittre Attack Framework List

CISSP Domain 8

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

As for Domain 8, these are my notes:

 

CISSP Domain 7

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 7, these are my notes:

 

CISSP Domain 6

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 6, these are my notes:

 

CISSP Domain 5

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 5, these are my notes:

 

CISSP Domain 4

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 4, these are my notes:

 

CISSP Domain 3

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 3, these are my notes:

 

CISSP Domain 2

Certified Information Systems Security Professional logo

 

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 2, these are my notes:

 

CISSP Domain 1

Certified Information Systems Security Professional logo

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 1, these are my notes:

 

Linux: sudo escalation of privileges - IT Professionals Guide

1. Create User and make sure they're able to login

Setup for login and execute tasks:

First you would have created a user:

useradd -m bob -G sudo -s /bin/bash
passwd bob

Being able to login you add to .profile (on top)
vi .profile
PATH=/usr/sbin:$PATH

check who's in sudo with:

groups sudo
groups bob

 

1.1.groups.bob 

Subcategorieën