OpenSSL Heartbleed bug and Exchange Server vulnerability

If you enjoyed this, please share it with others!
Share this with others

There is a news out there about the heartbleed flaw in OpenSSL and how it could affect email servers and web servers on the Internet. Exchange relies on SSL certificates so let’s break this down and ensure our servers aren’t vulnerable to attacks. Good…

If you enjoyed this, please share it with others!
Share this with others

War Dialing Returns in 2014 – Modem and VOIP Security

If you enjoyed this, please share it with others!
Share this with others

For anyone who hasn’t seen the movie WarGames, you may not know what war dialing is. Some of you might know about war dialing, but wrongly assume that it’s an outdated hacking method that doesn’t even work nowadays. Either way, I encourage you to check out this information-packed article on war dialing and how it […]

If you enjoyed this, please share it with others!
Share this with others

Penetration Testing 101 – Part 2 – White Box Testing

If you enjoyed this, please share it with others!
Share this with others

White Box Testing – A Quick And Dirty Overview Wireless security experts and those aspiring to become one should be familiar with white box testing both as a concept and also the tactics of how to successfully carry out and document a white box penetration test. If you haven’t seen the article on black box […]

If you enjoyed this, please share it with others!
Share this with others

Rainbow Tables and Dictionaries – What Are They?

If you enjoyed this, please share it with others!
Share this with others

Find out more about rainbow tables: The Rise of Rainbow Tables A rainbow table is a precomputed look up table for reversing cryptographic hash functions. Rainbow tables are mostly used to crack encrypted password hashes. They can potentially speed up the process of cracking passwords. In fact, they have the possibility of speeding up the password cracking process exponentially. Why is […]

If you enjoyed this, please share it with others!
Share this with others

Penetration Testing 101 – Black Box Testing

If you enjoyed this, please share it with others!
Share this with others

What is Black Box Testing? This is the first part of a 3-part series on penetration testing methodologies and techniques. We’re going to cover the 3 distinct forms of penetration testing: black box testing, white box testing, and gray box testing. You may already know what black box testing is, but I still would encourage […]

If you enjoyed this, please share it with others!
Share this with others

How Do You…? Enable WiFi Kali Linux

If you enjoyed this, please share it with others!
Share this with others

One of the most popular Internet search terms is “enable WiFi Kali Linux” and there’s no mistaking why. One of the most popular operating systems that IT Security Professionals and Penetration Testers use is called Kali Linux. Kali is a specialized, locked down Linux OS that comes preloaded with tons of security tools and utilities. […]

If you enjoyed this, please share it with others!
Share this with others

Even Drones are Vulnerable to WiFi Attacks

If you enjoyed this, please share it with others!
Share this with others

WiFi attacks now affect drones! Who would have thought, right? As reported by newscientist.com software engineer named Samy Kamkar wrote a program called SkyJack that can easily hack and take control of drones. He’s got an awesome YouTube video below that you should check out. Many drones are controlled via WiFi networks, so hopefully you can […]

If you enjoyed this, please share it with others!
Share this with others

Kali Linux – Initial Setup and Configuration Guide

If you enjoyed this, please share it with others!
Share this with others

Kali Linux is fast becoming the number one operating system security professionals and penetration testers use during ethical hack engagements. You may have heard of or used Back Track, and the great thing about it is Kali Linux is simply the successor to Back Track. The same group of researches and security professionals maintain Kali, […]

If you enjoyed this, please share it with others!
Share this with others

Hacking Software for WiFi Security Professionals

If you enjoyed this, please share it with others!
Share this with others

Security Professionals need to be intimately familiar with all a huge assortment of hacking software. There are literally THOUSANDS of hacking tools available for download. Some of these tools are free. Some of them must be purchased. Some of them are open source. Some of them are gold. Some of them are shit. And let’s […]

If you enjoyed this, please share it with others!
Share this with others

Rogue AP Dangers – Wireless Evil Twin Attack Techniques

If you enjoyed this, please share it with others!
Share this with others

A rogue access point is a particularly dangerous attack that IT Security Professionals must consider. Why is a rogue access point such a prominent threat, and what exactly is a rogues access point attack? Let’s take a closer look. Consider countless people that pass through airports on a day to day basis. Travelers coming home, […]

If you enjoyed this, please share it with others!
Share this with others

WEP vs WPA vs WPA2 wireless encryption

If you enjoyed this, please share it with others!
Share this with others

 **Take the interactive quiz below to test your IT security knowledge** WEP vs WPA – WiFi Encryption Show Down I’ll go ahead and tell you that the WEP vs WPA debate ended a long time ago. WPA is the winner, and will be for the foreseeable future. WEP and WPA are just acronyms referring to […]

If you enjoyed this, please share it with others!
Share this with others

Now Hiring! How to Become a Wireless Security Auditor

If you enjoyed this, please share it with others!
Share this with others

                Your country needs wireless security auditors! If you only ask yourself one question today, let it be this: Do you have the drive and initiative to become a wireless security auditor? If you happened to say yes, then you’re on the right path so far. In my […]

If you enjoyed this, please share it with others!
Share this with others

When WiFi Hacking Fails – DoSing Wireless Networks with MDK3

If you enjoyed this, please share it with others!
Share this with others

WiFi Hacking with Denial of Service hi jinks. Inevitably, as a wireless security professional, you will run into situations where all your complex WiFi hacking techniques fail. You’ve run through all the command options, all of the tools. You’ve tried a dictionary attack, a WPS attack, and a precomputed attack. You’ve even tried spoofing the […]

If you enjoyed this, please share it with others!
Share this with others

Hack WiFi with Crunch or Hash Cat – No Dictionaries Needed

If you enjoyed this, please share it with others!
Share this with others

As you’ve probably discovered so far, there are tons of ways we can hack WiFi passwords, be they WEP or WPA/WPA2. For network security professionals, you need to muster all the troops you can get to help you in your wireless network audits. By this I mean tools. Network security professionals need a vast range […]

If you enjoyed this, please share it with others!
Share this with others