by Grant Collins | May 31, 2020 | Projects
Raspberry Pi Network Scanner Overview A network scanner is a computer program used to locate devices running on a network. Using a Raspberry Pi device, create a network scanner to keep track of hosts connected on your local network. Project Recommendations It is...
by Grant Collins | May 31, 2020 | Projects
The Sniffing Spoofing Project Overview Sniffing is the process of intercepting and collecting network traffic as it passes over a digital network. Spoofing is the act of disguising a communication from an unknown source as being trustworthy. Using a packet analyzing...
by Grant Collins | May 31, 2020 | Projects
Password Attack Challenge Overview Passwords are an important, yet overlooked component of maintaining proper security posture. According to the NIST 800-63 Password Guidelines, a password should be at least 8 characters minimum, use all ASCII characters, support a 64...
by Grant Collins | May 26, 2020 | Projects
The Complete Wireless Attack Project Overview A three-step project to get you started with understanding and conducting wireless attacks. Step 1: Understand the types of attacks performed on a wireless network. Step 2: Learn and use a popular wireless attacking tool...
by Grant Collins | May 26, 2020 | Projects
Information Gathering Project Overview Information gathering is one of the first basic steps when conducting a successful penetration test. During the information gathering phase, the main focus is to collect facts about the target device or machine such as IP...
by Grant Collins | May 26, 2020 | Projects
Vulnerable Machine Challenges Overview Use a service like Vulnhub, TryHackMe, CyberSecLabs, or Hack the Box. Download vulnerable virtual machines. Probe for and analyze vulnerabilities. If you are just beginning, follow walkthrough demonstrations in the form of videos...