Crypto

Blog Articles

Ethical Hacking - Demo Hacking WiFi

 

Hi peeps,

This is my demo about Wi-Fi Hacking.

I'll show you what tools to use, what kind of password lists exist and how many characters will or will not keep you save from attacking.

Please forgive my stuttering as English is not my native language. I did the best I could (several times).

 

 

 

Hacking Demo MS17 010 EternalBlue SMB Exploit - What can you do and what must be done

Hi, I'm Martijn and will show you the EternalBlue SMB exploit.


This is a critical vulnerability in the SMB Server.
I'm going to show you this in this demo.

Not all people have developed a Cyber Security / Infosec mindset.
As the results will show you people do not apply best practices.

Allot of people don't patch
Allot of people don't secure their devices
Most people do not monitor their systems.

So let's talk about shodan results.

Cyber Security - Red and Blue Teaming

Cyber Security - Blue & Red Teaming


General information about this document

The purpose of this document is to defend the Blue Team (IT Professionals) and provide insight in the tools and process on which a pen tester (Red Teams or Hackers) will approach the network from outside to inside.

CISSP Domain 8

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

As for Domain 8, these are my notes:

 

CISSP Domain 7

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 7, these are my notes:

 

CISSP Domain 6

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 6, these are my notes:

 

CISSP Domain 5

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 5, these are my notes:

 

CISSP Domain 4

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 4, these are my notes:

 

CISSP Domain 3

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 3, these are my notes:

 

CISSP Domain 2

Certified Information Systems Security Professional logo

 

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 2, these are my notes:

 

CISSP Domain 1

Certified Information Systems Security Professional logo

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 1, these are my notes:

 

Linux: sudo escalation of privileges - IT Professionals Guide

1. Create User and make sure they're able to login

Setup for login and execute tasks:

First you would have created a user:

useradd -m bob -G sudo -s /bin/bash
passwd bob

Being able to login you add to .profile (on top)
vi .profile
PATH=/usr/sbin:$PATH

check who's in sudo with:

groups sudo
groups bob

 

1.1.groups.bob 

Subcategories