Building Your Own Pentest Box: Part 2 – Setting Up Kali Linux
2. Once completed, log in to the VM using the credentials below: Username: vagrant Password: vagrant 3. Check network settings...
Building Your Own Pentest Box: Part 1 – Setting Up Metasploitable 3
Background: Metasploitable3 is a virtual machine (VM) purposefully designed with numerous security vulnerabilities. It serves as a target for testing...
Exploring Microsoft Defender for Office 365 – Phishing Emails
Protecting your email system from cyberthreats like phishing, ransomware, and business email compromise is crucial in today’s digital landscape. With...
Microsoft Defender For Endpoint Part 2
Vulnerability Discovery and Remediation with Microsoft Defender & Intune Overview: Last time, we installed Microsoft Defender, identified vulnerabilities, and viewed...
Microsoft Defender For Endpoint Part 1
Installing Windows Defender and Examining Vulnerabilities Overview : Defender for Endpoint, Microsoft’s enterprise security platform, integrates endpoint behavioral sensors within...
Vulnerability Management Labs Review
Contents: Lab 1 : Setting up Metasploitable 2 & Scanning Using Nmap Lab 2 : Vulnerability Scanning Using Nessus Lab...
How to Build Your Microsoft AD/Configuration Manager + Pentesting Lab in 30 Minutes
This lab kit from Microsoft contains evaluation software designed for IT professionals interested in assessing Windows 10 deployment and management...