BSidesLV and Multi-Cloud Security

I attended a two-day multi-cloud red teaming course at BSidesLV. The folks over at labs.cyberwarfare.live were conducting the training session and below are my own thoughts: Intro to Multi-Cloud Red Teaming Analyse and investigate various Web, Network, Host And Active Directory based attacks by various defensive solutions. Hunt Cyber Threats in a realistic enterprise environment. … Read more

Mid 2021 check-in – Part 2

In my last post I shared my journey of being VMware Certified. I had checked off a bucket list item and wanted to continue the while I had the momentum. Another certification I always had my eyes on was CompTIA’s Security + certification. While it is regarded as an entry level certification, it does open … Read more

Ethical Hacking Final – Fall 2018 (Mission College)

For my final project in my ethical hacking course (CIT016 at Mission College), we had to create a 7 minute video demonstrating a vulnerability with Kali Linux. I’ve decided to showcase a vulnerability of WPA2 by cracking the hashed password and ultimately logging into the wireless network.  In order to crack WPA2, you will need … Read more

Ethical Hacking Midterm – Fall 2018 (Mission College)

I am currently taking an Ethical Hacking course at Mission College (CIT016), taught by Micky Pandit. For our mid-term project, we had to create videos on a product and showcase how to install, configure and use it. Upon learning how easy it is to find vulnerabilities and pwn devices, our paranoia got dialed up to … Read more

Discovering VMware ESX servers

My colleague Ashish Hanwadikar wrote a quick post on Linkedin on discovering ESX servers in the same subnet. Here is the post: “VMware ESX servers have SLP (Service Discovery Protocol) enabled by default making it easy to discover all ESX servers in a given subnet through any SLP client. For example, on linux, running the … Read more

Two Factor Authentication for free

Sounds cool! But what is it? Lets start off on what its made of: Knowledge based authentication. Possession based authentication. A good example of two-factor authentication is your ATM card. You know your PIN. Its something you made up. But that is something anyone can glimpse over and see. To safeguard that, you need your … Read more