Blog Archives

How to become a hacker

The Weekend Penetration Testing Lab Creation Bootcamp

Have you ever wondered how to become a hacker? How are the bad guys breaching organizations and not getting caught?  Okay, maybe you’ve seen some videos online but the truth is the only way you’ll learn how to hack is

Posted in Laptops, Security, Windows, Windows 10, Windows 7, Windows 8 Tagged with: , , ,

3 things to do when text message forwarding isn’t working on your iPhone

What’s up! Happy New Year everyone. Today I want to talk about Text Message Forwarding on your iPhone and some problems you might have experienced with it. So, I don’t know if you knew this or not but when Apple

Posted in Apple, Smartphones, Smartphones

Destroying a Cisco Switch with CDP Flooding

Destroying a Cisco Switch in 5 minutes

This is an easy Denial of Service (DoS) attack to launch.  We’re going to use the Cisco Discovery Protocol (CDP) to bring a switch to its knees.  It literally only took me 5 minutes to completely destroy this enterprise class

Posted in Hardware, What Is Tagged with: ,

How to setup an 5520 ASA 5.2 in GNS 3 version 1.3

Image credit aliimg.com

Would it be nice if you could console into a virtual ASA 5520 running ASA 8.4.2?  You could setup NAT, site-to-site VPNs with virtual hosts and go crazy with firewall rules.  The answer is yes, you can and I’m about

Posted in Hardware, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 8, Windows 8.1 Tagged with: , ,

Networking 210: All about Routing (Part 3 of 3)

Networking 210: Routing

In the last guide we talked about Dynamic Routing protocols and in this one one we’ll finish up with OSPF and EIGRP.

Posted in Hardware, What Is Tagged with: , ,

Last updated by at .