For my final project in my ethical hacking course (CIT016 at Mission College), we had to create a 7 minute video demonstrating a vulnerability with Kali Linux. I’ve decided to showcase a vulnerability of WPA2 by cracking the hashed password and ultimately logging into the wireless network. In order to crack WPA2, you will need … Read more
In this video, I go over the Basic mission series: Challenge 2 and 3. A basic understanding on HTML is required to complete these missions. My video below shows how to complete challenge 2 and 3.
This is a utility that sets Access Control Lists (ACLs) for files and directories for linux hosts. I’m managing a Linux host on AWS and a design firm is working on the website itself. Even though the host itself is a sandbox webserver, I don’t want to give out root credentials – so we set … Read more
Sounds cool! But what is it? Lets start off on what its made of: Knowledge based authentication. Possession based authentication. A good example of two-factor authentication is your ATM card. You know your PIN. Its something you made up. But that is something anyone can glimpse over and see. To safeguard that, you need your … Read more