Blog Archives

Start to finish: Cracking a Windows Server 2012 R2 Administrator account (Part 1 of 2)

Cracking Windows Server 2012 R2

I want you to imagine your best friend from college challenges you to a duel. Here’s the deal: you both graduated with honors from ivy league schools but your careers bifurcated down different paths.  You decided to work in corporate

Posted in How To, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP Tagged with: , , ,

Fun with CUPP and Medusa in Kali Linux (Part 3 of 3)

Cracking passwords in Kali Linux

If you’ve been following my CUPP and Medusa series then you know how to use the Common User Passwords Profiler (CUPP) to create a carefully tuned password list that matches your victim’s personal data.  Furthermore, you know how to use Medusa to crack against that list

Posted in Linux Tagged with: , , ,

Fun with CUPP and Medusa in Kali Linux (Part 2 of 3)

Cracking passwords in Kali Linux

In the previous guide, I showed you how to use the Common User Password Profiler in Kali Linux.  Today, we’re going to crack passwords against that list.

Posted in Linux Tagged with: , , , ,

Fun with CUPP and Medusa in Kali Linux (Part 1 of 3)

Cracking passwords in Kali Linux

What’s the best way to crack a password? Your first idea might be to grab a giant wordlist and start a dictionary attack against an account such as a Windows Active Directory account or a web login.  Or you might

Posted in Linux Tagged with: , , , ,

Detecting Rootkits on a PC

Detecting Rootkits in Kali Linux

Imagine malware so sophisticated that it not only disappears from the Windows Task Manager and your antivirus software but also modifies the code that undergirds the operating system in such a way that it’s virtually impossible to detect. Does such a thing

Posted in Linux, Security, Windows, Windows 10, Windows 8.1 Tagged with: , , , ,