Inside a Brute Force Router Takeover

Routers provide access to the Internet for millions of users, but hackers are also using routers to gain access into your home network. In this article I expose the dangers of default credentials by performing a brute force router takeover. Many modern home routers offer a remote management feature, and luckily router manufacturers have stopped […]

Understanding the Cyber Kill Chain in the Cloud

The cyber kill chain defines the lifecycle of a cyber attack and identifies various phases during a system intrusion. Although there are numerous interpretations of the cyber kill chain, the most basic form consists of seven stages. In this post I describe these seven stages of the cyber kill chain and how it applies in […]

How to Install Metasploitable in VirtualBox

In this article I go over how to install Metasploitable in VirtualBox. Metasploitable is a virtual machine with several intentional misconfigurations and vulnerabilities for you to exploit. This is a great tool for sharpening your penetration testing skills. You can definitely get Metasploitable up and running with out a full lab, but I highly recommend […]

Selecting a Home Security Camera System

Installing a home security camera system in your home, business, or vacation home is one of the easiest way to deter crime and gain peace of mind. While selecting a home security camera system may seem like a daunting task, it is relatively easy to select the right system based on the area you intend […]