by Grant Collins | May 18, 2020 | Projects
MAC Flooding Program Overview MAC flooding is a technique used on network switches to force legitimate MAC table entries out of the switch and potentially send sensitive information to portions of the network. Use your favorite programming language to write a program...
by Grant Collins | May 18, 2020 | Projects
SQL Vulnerability Assessment Overview Structured Query Language (SQL) is a programming language designed to manage data in a relational database. SQL injections are code injecting techniques used to place malicious statements into an entry field for execution –...
by Grant Collins | May 18, 2020 | Projects
Write a Program to Break a Caesar Cipher Overview The Caesar cipher is a substitution cipher and is one of the simplest encryption techniques – making it easy to break. Use your favorite programming language to generate a Caesar cipher. After generating the...
by Grant Collins | May 17, 2020 | Projects
Setup a Vulnerability Scanner Overview A vulnerability scanner is a computer program designed to scan and assess computer, networks, servers, and application for known weaknesses. Setup an open source or trial version vulnerability scanner program. Initialize test...
by Grant Collins | May 17, 2020 | Projects
Nmap Tool & Scanning Overview Nmap is a free, open source network scanner used to discover hosts and services on a computer network. Nmap provides a number of features for probing computer networks, including operating system detection and more. Configure virtual...