Category: Cyber Security

Ethical Hacking Series: 6.OWASP Exercises- Dictionary Attack using Hydra

Description Attackers constantly try to crack the passwords of other people in order to gain access to their accounts. The dictionaryattack is one of the most common ways of attempting to crack a user’s password. The attack works by attempting to use all of the words in a given dictionary file as the password for the user. If the user’s password is in the […]

Ethical Hacking Series: 5.Cracking Linux Passwords

Introduction Linux systems store user passwords in cryptographic hash format. Modern Linux distributions store the hashes in /etc/shadow. It is computationally intractable to reverse a cryptographic hash to obtain the original password. However, it is possible to generate a hash from a sequence of characters and if the generated hash matches the password hash the sequence […]

Ethical Hacking Series: 4.Detecting Windows Vulnerabilities

Description Most estimates put Microsoft’s Windows operating system running on the vast majority of Desktop computers. With such a large installed base, Windows systems are attractive targets for attackers. This Lab will detect and analyze the vulnerabilities of a Windows host. You will learn how to prevent having vulnerabilities exploited and learn how to investigate specific […]

Ethical Hacking Series: 3.Security Audit Techniques

Description This Lab focuses on auditing the network security of Linux hosts. You will audit a Kali Linux host and an Ubuntu 8 host that is intentionally configured to be vulnerable to attacks. The techniques you learn apply to all modern distributions of Linux. By including the auditing techniques as part of routine system administration […]

Ethical Hacking Series: 2.Interpreting Security Tool Outputs(Nmap Scan analysis And Live Traffic Analysis with Wireshark)

Description Security tools greatly simplify the task of assessing the security of our environments. However, there is still room for interpretation of reported results and analysis of data. In this Lab, we will use two popular security tools and learn how to understand more about what the tools are doing and how to interpret their […]

Ethical Hacking Series: 1. Network Mapping and Target Identification using ArpScan, Nmap and Zenmap

Description One of the first phases of a network security assessment is to network mapping which identifies devices on the network. In this Lab, we will use a variety of tools in Kali Linux to map out a local network to identify targets by discovering hosts on the network. We will understand the difference between how tools […]

Back To Top

Contact Us