Building Your Own Pentest Box: Part 3 – Ethical Hacking (Exploitation with Metasploit )
Important Disclaimer: Using these modules for anything other than testing on a system you have permission to exploit is illegal...
Building Your Own Pentest Box: Part 2 – Setting Up Kali Linux
2. Once completed, log in to the VM using the credentials below: Username: vagrant Password: vagrant 3. Check network settings...
Building Your Own Pentest Box: Part 1 – Setting Up Metasploitable 3
Background: Metasploitable3 is a virtual machine (VM) purposefully designed with numerous security vulnerabilities. It serves as a target for testing...
Exploring Microsoft Defender for Office 365 – Phishing Emails
Protecting your email system from cyberthreats like phishing, ransomware, and business email compromise is crucial in today’s digital landscape. With...
Microsoft Defender For Endpoint Part 2
Vulnerability Discovery and Remediation with Microsoft Defender & Intune Overview: Last time, we installed Microsoft Defender, identified vulnerabilities, and viewed...
Microsoft Defender For Endpoint Part 1
Installing Windows Defender and Examining Vulnerabilities Overview : Defender for Endpoint, Microsoft’s enterprise security platform, integrates endpoint behavioral sensors within...
Vulnerability Management Labs Review
Contents: Lab 1 : Setting up Metasploitable 2 & Scanning Using Nmap Lab 2 : Vulnerability Scanning Using Nessus Lab...
How to Build Your Microsoft AD/Configuration Manager + Pentesting Lab in 30 Minutes
This lab kit from Microsoft contains evaluation software designed for IT professionals interested in assessing Windows 10 deployment and management...
The Pentester BluePrint: Starting a Career as an Ethical Hacker Book Review
According to the Cambridge dictionary, a blueprint means an early plan or design that explains how something .might be achieved....
Surviving IT Book Review
Sept 24, 2023 I highly recommend Mr. Paul Cunningham’s book to anyone seeking career advice in the IT industry. Whether...