Raspberry Pi Network Scanner Project Overview

Raspberry Pi Network Scanner Overview A network scanner is a computer program used to locate devices running on a network. Using a Raspberry Pi device, create a network scanner to keep track of hosts connected on your local network. Project Recommendations It is...

The Sniffing Spoofing Project Overview

The Sniffing Spoofing Project Overview Sniffing is the process of intercepting and collecting network traffic as it passes over a digital network. Spoofing is the act of disguising a communication from an unknown source as being trustworthy. Using a packet analyzing...

Password Attack Challenge Overview

Password Attack Challenge Overview Passwords are an important, yet overlooked component of maintaining proper security posture. According to the NIST 800-63 Password Guidelines, a password should be at least 8 characters minimum, use all ASCII characters, support a 64...

The Complete Wireless Attack Project Overview

The Complete Wireless Attack Project Overview A three-step project to get you started with understanding and conducting wireless attacks. Step 1: Understand the types of attacks performed on a wireless network. Step 2: Learn and use a popular wireless attacking tool...

The Information Gathering Project Overview

Information Gathering Project Overview Information gathering is one of the first basic steps when conducting a successful penetration test. During the information gathering phase, the main focus is to collect facts about the target device or machine such as IP...

Vulnerable Machine Challenges Project Overview

Vulnerable Machine Challenges Overview Use a service like Vulnhub, TryHackMe, CyberSecLabs, or Hack the Box. Download vulnerable virtual machines. Probe for and analyze vulnerabilities. If you are just beginning, follow walkthrough demonstrations in the form of videos...