Blog Archives

This is the most authentic phishing site I’ve ever seen

There’s a new phishing site proof of concept on the block and I guarantee you it would trick you.  Think I’m kidding? Check this out.

Posted in Apple, Google Chrome, Malware, Mozilla Firefox, Security Tagged with: , , ,

How to become a hacker

The Weekend Penetration Testing Lab Creation Bootcamp

Have you ever wondered how to become a hacker? How are the bad guys breaching organizations and not getting caught?  Okay, maybe you’ve seen some videos online but the truth is the only way you’ll learn how to hack is

Posted in Laptops, Security, Windows, Windows 10, Windows 7, Windows 8 Tagged with: , , ,

Fun with CUPP and Medusa in Kali Linux (Part 3 of 3)

Cracking passwords in Kali Linux

If you’ve been following my CUPP and Medusa series then you know how to use the Common User Passwords Profiler (CUPP) to create a carefully tuned password list that matches your victim’s personal data.  Furthermore, you know how to use Medusa to crack against that list

Posted in Linux Tagged with: , , ,

Fun with CUPP and Medusa in Kali Linux (Part 1 of 3)

Cracking passwords in Kali Linux

What’s the best way to crack a password? Your first idea might be to grab a giant wordlist and start a dictionary attack against an account such as a Windows Active Directory account or a web login.  Or you might

Posted in Linux Tagged with: , , , ,

Crypto 201: Public Key Infrastructure (PKI) – Cryptography for smarties (Part 3 of 3)

PKI with Vonnie, background image credit J. Triepke via Flickr

So let’s trace what happens when the certificate arrives at your computer.  I n the last post we talked about why it’s mathematically infeasible for someone to forge a root certificate signature.  I also showed you how to view the

Posted in Linux, Mac OS X 10.10 Yosemite, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , , ,

Last updated by at .