by Grant Collins | May 31, 2020 | Projects
Password Attack Challenge Overview Passwords are an important, yet overlooked component of maintaining proper security posture. According to the NIST 800-63 Password Guidelines, a password should be at least 8 characters minimum, use all ASCII characters, support a 64...
by Grant Collins | May 30, 2020 | Cybersecurity Homelab Project
Configuring a VPN Server in Cybersecurity Homelab via OpenVPN Article Goal In this article, I will be walking you through my process of installing and deploying a VPN server in the homelab for the purpose of simulating an environment similar to an enterprise network....
by Grant Collins | May 26, 2020 | Projects
The Complete Wireless Attack Project Overview A three-step project to get you started with understanding and conducting wireless attacks. Step 1: Understand the types of attacks performed on a wireless network. Step 2: Learn and use a popular wireless attacking tool...
by Grant Collins | May 26, 2020 | Projects
Information Gathering Project Overview Information gathering is one of the first basic steps when conducting a successful penetration test. During the information gathering phase, the main focus is to collect facts about the target device or machine such as IP...
by Grant Collins | May 26, 2020 | Projects
Vulnerable Machine Challenges Overview Use a service like Vulnhub, TryHackMe, CyberSecLabs, or Hack the Box. Download vulnerable virtual machines. Probe for and analyze vulnerabilities. If you are just beginning, follow walkthrough demonstrations in the form of videos...