Author: admin

Ethical Hacking Series: 6.OWASP Exercises- Dictionary Attack using Hydra

Description Attackers constantly try to crack the passwords of other people in order to gain access to their accounts. The dictionaryattack is one of the most common ways of attempting to crack a user’s password. The attack works by attempting to use all of the words in a given dictionary file as the password for the user. If the user’s password is in the […]

Ethical Hacking Series: 5.Cracking Linux Passwords

Introduction Linux systems store user passwords in cryptographic hash format. Modern Linux distributions store the hashes in /etc/shadow. It is computationally intractable to reverse a cryptographic hash to obtain the original password. However, it is possible to generate a hash from a sequence of characters and if the generated hash matches the password hash the sequence […]

Ethical Hacking Series: 4.Detecting Windows Vulnerabilities

Description Most estimates put Microsoft’s Windows operating system running on the vast majority of Desktop computers. With such a large installed base, Windows systems are attractive targets for attackers. This Lab will detect and analyze the vulnerabilities of a Windows host. You will learn how to prevent having vulnerabilities exploited and learn how to investigate specific […]

Ethical Hacking Series: 3.Security Audit Techniques

Description This Lab focuses on auditing the network security of Linux hosts. You will audit a Kali Linux host and an Ubuntu 8 host that is intentionally configured to be vulnerable to attacks. The techniques you learn apply to all modern distributions of Linux. By including the auditing techniques as part of routine system administration […]

Ethical Hacking Series: 2.Interpreting Security Tool Outputs(Nmap Scan analysis And Live Traffic Analysis with Wireshark)

Description Security tools greatly simplify the task of assessing the security of our environments. However, there is still room for interpretation of reported results and analysis of data. In this Lab, we will use two popular security tools and learn how to understand more about what the tools are doing and how to interpret their […]

Ethical Hacking Series: 1. Network Mapping and Target Identification using ArpScan, Nmap and Zenmap

Description One of the first phases of a network security assessment is to network mapping which identifies devices on the network. In this Lab, we will use a variety of tools in Kali Linux to map out a local network to identify targets by discovering hosts on the network. We will understand the difference between how tools […]

Google Cloud: Getting started with Certificate Authority Service

Overview Google Cloud Certificate Authority Service (CAS) is a highly available & scalable service that enables you to simplify, automate, and customize the deployment, management, and security of private certificate authorities (CA). In this hands-on lab you’ll learn how to enable the service API, create a root, a subordinate CA and eventually issue a certificate. […]

Google Cloud: Introduction to Artifact Registry

Overview Artifact Registry provides the same container management features as Container Registry and includes additional features and benefits:Additional artifact formats You can create repositories for the following artifact formats: Container images: Docker, Helm Language packages: Java, Node.js, Python OS packages (Preview): Debian, RPM Regional repositories Container Registry only provides multi-regional registry hosts. Artifact Registry provides both regional and multi-regional registry hosts. Multiple, separate repositories […]

Google Cloud: Creating Image Classification ML Model on Dog/Cat Dataset

Overview In this lab, you upload images to Cloud Storage and use them to train a custom model to recognize whether the image is of Dog or Cat. What you learn In this lab, you learn how to perform the following tasks: Upload a labeled dataset to Cloud Storage and connect it to AutoML Vision […]

Google Cloud: Classifying Images of Clouds in the Cloud with AutoML Vision

Overview In this lab, you upload images to Cloud Storage and use them to train a custom model to recognize different types of clouds (cumulus, cumulonimbus, etc.). What you learn In this lab, you learn how to perform the following tasks: Upload a labeled dataset to Cloud Storage and connect it to AutoML Vision with […]

Back To Top

Contact Us