Sunday , 12 July 2020

The Life and Times of a Virus

The Life and Times of a Virus

The Life and Times of the virus: Let’s explore what it meant to be a virus before we get too far along. Simply put, a virus is a self-replicating application that attaches itself to other executable programs. Many viruses affect the host as soon as they are executed; other lie in wait, dormant, until a predetermined even or time, before …

Read More »

Ways to Locate Wireless Networks

Ways to Locate Wireless Networks

Ways to Locate Wireless Networks: In order to attack, you must first find a target, and though site surveys can make this easier, they cannot help in every case. Several tools and mechanism make locating a target network easier.   The following tools can complement wardriving or be used on their own: OpenSignal is a useful app that can be …

Read More »

Countermeasures of Social Networking

Countermeasures of Social Networking

Countermeasures for Social Networking: Because social networking exploded in popularity so quickly, companies and individuals had little time to deal with the problems the technology brought to bear. Surveys taken a few years ago found that many companies either did not have policy in place regarding social networking or were unaware of the risks. Recently, however, people are slowly starting …

Read More »

USB Password Theft

USB Password Theft

USB Password Theft: In contrast to manual methods, there is some automated mechanism for obtaining passwords, such as via USB drivers. This method entails embedding a password-stealing application on a USB and then physically plugging the drive into a target system. Because many users store they passwords for applications an online sites on their local machine, the passwords may be …

Read More »

Performing a Password Crack – Insecure Logon Systems

Performing a Password Crack

Insecure Logon Systems: Many web applications require some sort of authentication or login process prior to their use. Because of the importance of the logon process, it is essential that it be handled safely and securely. You must take care that the incorrect or improper entry of information does not reveal data that an attacker can use to gain additional …

Read More »

Cracking WPA with Reaver and Wash

Cracking WPA: To crack WPA you must use a different approach than you would with WEP. Fortunately, one of the best tools available for thwarting WPA is freely available in Kali Linux in the form of Reaver.  Reaver exploits holes in wireless routers in an attempt to retrieve information about the WPA preshared key that is used to access the …

Read More »

Cracking WEP with Kali Linux

Cracking WEP with Kali Linux: In this exercise you will use Kali Linux 2.0 to break WEP. To perform this exercise, you will need to have Kali Linux Installed on a Physical system (avoid virtualization). You will also need to have an access point configured to use WEP (which you own) to crack the key on. Once you have configured …

Read More »

Types of Cloud Solutions

Cloud Solution Security

Types of Cloud Solutions: Calling the Cloud “the cloud” simply isn’t accurate because it doesn’t fully describe the scope of cloud services. While cloud services all share the ability to provide shared resources, shared software, and shared information to reduce an organization’s information technology (IT) costs, they also provide the ability to combine services in different ways and scale up …

Read More »

What is the Cloud Technologies and Security

What is the Cloud Technologies and Security

What is the cloud: While cloud computing is new term, it is not a new concept and is actually a grown-up and more mature version of what used to be known as grid computing. No matter what you call it, the cloud is a way of moving services, infrastructure, and platform into the new environment. Ideally, this move makes the …

Read More »

Mobile Device Security – Countermeasures – Summary – Exam Essentials

Mobile Device Security – Countermeasures – Summary – Exam Essentials

Countermeasures: Similarly to securing desktops, servers, networks, and other equipment, you can take some basics steps to make mobile devices more resistant to attack. What’s included here is some basic guidance but not a comprehensive list of all that can be done: Setting passwords on all mobile devices is a requirement for all devices that will be attached to a …

Read More »