Crypto

Blog Articles

Ethical Hacking - Demo Hacking WiFi

 

Hi peeps,

This is my demo about Wi-Fi Hacking.

I'll show you what tools to use, what kind of password lists exist and how many characters will or will not keep you save from attacking.

Please forgive my stuttering as English is not my native language. I did the best I could (several times).

 

 

 

Hacking Demo MS17 010 EternalBlue SMB Exploit - What can you do and what must be done

Hi, I'm Martijn Kamminga and will show you the EternalBlue SMB exploit.


This is a critical vulnerability in the SMB Server.
I'm going to show you this in this demo.

Not all people have developed a Cyber Security / Infosec mindset.
As the results will show you people do not apply best practices.

Allot of people don't patch
Allot of people don't secure their devices
Most people do not monitor their systems.

So let's talk about shodan results.

Cyber Security - Red and Blue Teaming

Cyber Security - Blue & Red Teaming

v1.3 - Date: 05/21/2020
General information about this document

The purpose of this document is to defend the Blue Team (IT Professionals) and provide insight in the tools and process on which a pen tester (Red Teams or Hackers) will approach the network from outside to inside.

Cyber Security - Red and Blue Teaming

Cyber Security - Blue & Red Teaming

v1.3 - Date: 05/21/2020
General information about this document

The purpose of this document is to defend the Blue Team (IT Professionals) and provide insight in the tools and process on which a pen tester (Red Teams or Hackers) will approach the network from outside to inside.

SOC On A Budget SMB MittreAttack Checker InfoSec PS Security SysMon.ps1

SOC on a Budget - Small Business Companies

 


MittreAttackCheckerInfoSecPSSecuritySysMon.ps1 

 


- Event log threat hunting based on Mittre Attack Framework List

CISSP Domain 8

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

As for Domain 8, these are my notes:

 

CISSP Domain 7

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 7, these are my notes:

 

CISSP Domain 6

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 6, these are my notes:

 

CISSP Domain 5

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 5, these are my notes:

 

CISSP Domain 4

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 4, these are my notes:

 

CISSP Domain 3

Certified Information Systems Security Professional logo

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 3, these are my notes:

 

CISSP Domain 2

Certified Information Systems Security Professional logo

 

 

In regards to Kelly Handerhan whom provided the course CISSP at Cybrary I hereby provide you with the information I've acquired along with notes from the video.

The course can be followed, and you'll get a Certificate of Completion at Cybrary: https://www.cybrary.it/course/cissp

 

As for Domain 2, these are my notes:

 

Subcategorieën