In my last post I shared my journey of being VMware Certified. I had checked off a bucket list item and wanted to continue the while I had the momentum. Another certification I always had my eyes on was CompTIA’s Security + certification. While it is regarded as an entry level certification, it does open … Read more
For my final project in my ethical hacking course (CIT016 at Mission College), we had to create a 7 minute video demonstrating a vulnerability with Kali Linux. I’ve decided to showcase a vulnerability of WPA2 by cracking the hashed password and ultimately logging into the wireless network. In order to crack WPA2, you will need … Read more
In this video, I go over the Basic mission series: Challenge 2 and 3. A basic understanding on HTML is required to complete these missions. My video below shows how to complete challenge 2 and 3.
I am currently taking an Ethical Hacking course at Mission College (CIT016), taught by Micky Pandit. For our mid-term project, we had to create videos on a product and showcase how to install, configure and use it. Upon learning how easy it is to find vulnerabilities and pwn devices, our paranoia got dialed up to … Read more
I’ve came across a yet another easy and cool home project that is intended for Rapsberry Pis, but can run on any flavor of Linux (Requirements here). Its called Pi-Hole and you can set it up in 5 minutes or less. Website: https://pi-hole.net/ The idea is simple: it blocks all add traffic in your network … Read more
My colleague Ashish Hanwadikar wrote a quick post on Linkedin on discovering ESX servers in the same subnet. Here is the post: “VMware ESX servers have SLP (Service Discovery Protocol) enabled by default making it easy to discover all ESX servers in a given subnet through any SLP client. For example, on linux, running the … Read more
Sounds cool! But what is it? Lets start off on what its made of: Knowledge based authentication. Possession based authentication. A good example of two-factor authentication is your ATM card. You know your PIN. Its something you made up. But that is something anyone can glimpse over and see. To safeguard that, you need your … Read more