Password Attack Challenge Overview

Password Attack Challenge Overview Passwords are an important, yet overlooked component of maintaining proper security posture. According to the NIST 800-63 Password Guidelines, a password should be at least 8 characters minimum, use all ASCII characters, support a 64...

The Complete Wireless Attack Project Overview

The Complete Wireless Attack Project Overview A three-step project to get you started with understanding and conducting wireless attacks. Step 1: Understand the types of attacks performed on a wireless network. Step 2: Learn and use a popular wireless attacking tool...

The Information Gathering Project Overview

Information Gathering Project Overview Information gathering is one of the first basic steps when conducting a successful penetration test. During the information gathering phase, the main focus is to collect facts about the target device or machine such as IP...

Vulnerable Machine Challenges Project Overview

Vulnerable Machine Challenges Overview Use a service like Vulnhub, TryHackMe, CyberSecLabs, or Hack the Box. Download vulnerable virtual machines. Probe for and analyze vulnerabilities. If you are just beginning, follow walkthrough demonstrations in the form of videos...