BSidesLV and Multi-Cloud Security

I attended a two-day multi-cloud red teaming course at BSidesLV. The folks over at labs.cyberwarfare.live were conducting the training session and below are my own thoughts: Intro to Multi-Cloud Red Teaming Analyse and investigate various Web, Network, Host And Active Directory based attacks by various defensive solutions. Hunt Cyber Threats in a realistic enterprise environment. … Read more

Ethical Hacking Final – Fall 2018 (Mission College)

For my final project in my ethical hacking course (CIT016 at Mission College), we had to create a 7 minute video demonstrating a vulnerability with Kali Linux. I’ve decided to showcase a vulnerability of WPA2 by cracking the hashed password and ultimately logging into the wireless network.  In order to crack WPA2, you will need … Read more

Ethical Hacking Midterm – Fall 2018 (Mission College)

I am currently taking an Ethical Hacking course at Mission College (CIT016), taught by Micky Pandit. For our mid-term project, we had to create videos on a product and showcase how to install, configure and use it. Upon learning how easy it is to find vulnerabilities and pwn devices, our paranoia got dialed up to … Read more

setfacl

This is a utility that sets Access Control Lists (ACLs) for files and directories for linux hosts.  I’m managing a Linux host on AWS and a design firm is working on the website itself. Even though the host itself is a sandbox webserver, I don’t want to give out root credentials – so we set … Read more

Two Factor Authentication for free

Sounds cool! But what is it? Lets start off on what its made of: Knowledge based authentication. Possession based authentication. A good example of two-factor authentication is your ATM card. You know your PIN. Its something you made up. But that is something anyone can glimpse over and see. To safeguard that, you need your … Read more