Terms of Use For FixedByVonnie

By proceeding to access fixedByVonnie.com, you expressly acknowledge, and agree to, all of the following:

fixedByVonnie.com is a personal website and blog owned by Security Plus Pro LLC, which is being presented for informational purposes only. The views on this website are solely those of the website owner (and not those of any employer or of any professional associations affiliated with the website owner).  Any views expressed in this website and any information presented on this website, or in any of its blog entries, should not be relied on for any purpose whatsoever other than as the personal opinions of the website owner.  The website owner expressly disclaims any and all liability for any information presented on this site.  The owner of this website and its blog posts shall not be held liable, and shall be held harmless, for any errors or omissions in any information or representations contained in this website, or in any of its blog entries.  The website owner also expressly disclaims any liability for the current or future availability of any such information. The website owner makes no representations as to the accuracy or completeness of any information on this website or which may be found by following any link on this website. The website owner shall not be held liable for any losses, injuries, damages, claims, or causes of action, from the display or use of any information on this website or in any of its blog entries. If you use the information on this website, or on any of its blog entries, you do so solely at your own risk.

Security Archives - Page 2 of 20 - fixedByVonnie
Blog Archives

Start to finish: Cracking a Windows Server 2012 R2 Administrator account (Part 1 of 2)

I want you to imagine your best friend from college challenges you to a duel. Here’s the deal: you both graduated with honors from ivy league schools but your careers bifurcated down different paths.  You decided to work in corporate

Posted in How To, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , ,

Fun with CUPP and Medusa in Kali Linux (Part 3 of 3)

If you’ve been following my CUPP and Medusa series then you know how to use the Common User Passwords Profiler (CUPP) to create a carefully tuned password list that matches your victim’s personal data.  Furthermore, you know how to use Medusa to crack against that list

Posted in Linux Tagged with: , , ,

Fun with CUPP and Medusa in Kali Linux (Part 2 of 3)

In the previous guide, I showed you how to use the Common User Password Profiler in Kali Linux.  Today, we’re going to crack passwords against that list.

Posted in Linux Tagged with: , , , ,

Fun with CUPP and Medusa in Kali Linux (Part 1 of 3)

What’s the best way to crack a password? Your first idea might be to grab a giant wordlist and start a dictionary attack against an account such as a Windows Active Directory account or a web login.  Or you might

Posted in Linux Tagged with: , , , ,

Detecting Rootkits on a PC

Imagine malware so sophisticated that it not only disappears from the Windows Task Manager and your antivirus software but also modifies the code that undergirds the operating system in such a way that it’s virtually impossible to detect. Does such a thing

Posted in Linux, Security, Windows, Windows 10, Windows 8.1 Tagged with: , , , ,