Blog Archives

Fun with CUPP and Medusa in Kali Linux (Part 1 of 3)

Cracking passwords in Kali Linux

What’s the best way to crack a password? Your first idea might be to grab a giant wordlist and start a dictionary attack against an account such as a Windows Active Directory account or a web login.  Or you might

Posted in Linux Tagged with: , , , ,

Detecting Rootkits on a PC

Detecting Rootkits in Kali Linux

Imagine malware so sophisticated that it not only disappears from the Windows Task Manager and your antivirus software but also modifies the code that undergirds the operating system in such a way that it’s virtually impossible to detect. Does such a thing

Posted in Linux, Security, Windows, Windows 10, Windows 8.1 Tagged with: , , , ,

Destroying a Cisco Switch with CDP Flooding

Destroying a Cisco Switch in 5 minutes

This is an easy Denial of Service (DoS) attack to launch.  We’re going to use the Cisco Discovery Protocol (CDP) to bring a switch to its knees.  It literally only took me 5 minutes to completely destroy this enterprise class

Posted in Hardware, What Is Tagged with: ,

Cracking Windows Passwords (Part 2 of 2)

Cracking Windows Passwords

In the previous post I shared the inside scoop on hashes and methods of password extraction.  But there was one thing missing I didn’t tell you how to get the hash!  Today I’m going to enumerate four common ways to grab the

Posted in Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: ,

Cracking Windows Passwords (Part 1 of 2)

Cracking Windows Passwords

Do you remember a thing called trust?  I remember when I was 10 or 11 years old I decided to open a “family” bank for my brother and sister. Being the conniving bigger brother, I convinced them that their allowances

Posted in Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , , ,