Inside a Brute Force Router Takeover

Share this…FacebookPinterestTwitterLinkedinRedditRouters provide access to the Internet for millions of users, but hackers are also using routers to gain access into your home network. In this article I expose the dangers of default credentials by performing a brute force router takeover. Many modern home routers offer a remote management feature, and luckily router manufacturers have […]

Understanding the Cyber Kill Chain in the Cloud

Share this…FacebookPinterestTwitterLinkedinRedditThe cyber kill chain defines the lifecycle of a cyber attack and identifies various phases during a system intrusion. Although there are numerous interpretations of the cyber kill chain, the most basic form consists of seven stages. In this post I describe these seven stages of the cyber kill chain and how it applies […]

How to Install Metasploitable in VirtualBox

Share this…FacebookPinterestTwitterLinkedinRedditIn this article I go over how to install Metasploitable in VirtualBox. Metasploitable is a virtual machine with several intentional misconfigurations and vulnerabilities for you to exploit. This is a great tool for sharpening your penetration testing skills. You can definitely get Metasploitable up and running with out a full lab, but I highly […]

Selecting a Home Security Camera System

Share this…FacebookPinterestTwitterLinkedinRedditInstalling a home security camera system in your home, business, or vacation home is one of the easiest way to deter crime and gain peace of mind. While selecting a home security camera system may seem like a daunting task, it is relatively easy to select the right system based on the area you […]