Inside a Brute Force Router Takeover

Share this… Facebook Pinterest Twitter Linkedin RedditRouters provide access to the Internet for millions of users, but hackers are also using routers to gain access into your home network. In this article I expose the dangers of default credentials by performing a brute force router takeover. Many modern home routers offer a remote management feature, […]

Understanding the Cyber Kill Chain in the Cloud

Share this… Facebook Pinterest Twitter Linkedin RedditThe cyber kill chain defines the lifecycle of a cyber attack and identifies various phases during a system intrusion. Although there are numerous interpretations of the cyber kill chain, the most basic form consists of seven stages. In this post I describe these seven stages of the cyber kill […]

How to Install Metasploitable in VirtualBox

Share this… Facebook Pinterest Twitter Linkedin RedditIn this article I go over how to install Metasploitable in VirtualBox. Metasploitable is a virtual machine with several intentional misconfigurations and vulnerabilities for you to exploit. This is a great tool for sharpening your penetration testing skills. You can definitely get Metasploitable up and running with out a […]

Selecting a Home Security Camera System

Share this… Facebook Pinterest Twitter Linkedin RedditInstalling a home security camera system in your home, business, or vacation home is one of the easiest way to deter crime and gain peace of mind. While selecting a home security camera system may seem like a daunting task, it is relatively easy to select the right system […]