June, 2018

  • 4 June

    Monitoring System Logs

    Monitoring System Logs

    Monitoring System Logs: In addition to network monitoring, you must monitor the event logs. Event Logs are system logs that record various events that occur. Event logs comprise a broad category that includes some logs that are not relevant to security issue. But within that broad category are security and …

  • 4 June

    Types of Hardware Tools

    Types of Hardware Tools

    Hardware Tools: So which hardware-based tools should you become fluent with or concentrate on when testing or training? Becoming familiar with the following tools should help you prepare for the CEH exam. Read: Installing Software Tools and Virtualized Operating System Minipwner: Available at www.minipwner.com, this multipurpose tool is about the …

  • 3 June

    Installing Software Tools and Virtualized Operating System

    Installing Software Tools and Virtualized Operating System

    Installing a Virtualized Operating System: The next step in preparing the lab system is to install your virtual machines and configure them. Since I do not know which virtualization software you will choose, I will provide some broad steps on how the process works. You will need to research the …

  • 2 June

    Application Security

    Application Security

    The Application Security: There are a number of issues to be cognizant of when it comes to application security.  Many of these have been addressed—or will be addressed—in other posts where discussion is more relevant, but the following is a list of those issues that CompTIA wants you to be …

  • 2 June

    How to Figure out If Hackers Leaked Your Password

    How to Figure out If Hackers Leaked Your Password

    Figure out If Hackers Leaked Your Password: The passwords are on daily basis leaked onto the dark web, which is putting your online accounts and identity at risk. There are several types of tools & techniques that can help you figure out that your own details have been compromised by …

  • 2 June

    Intelligence Gathering – PTES

    Intelligence Gathering – Penetration Testing Execution Standard

    Intelligence Gathering – Penetration Testing Execution Standard: Once a plan is in place and proper preparation has been successfully completed, now you can begin the information-gathering process. This phase basically represents the start of the actual test, even though you will not yet be engaging your target directly. However, at …

  • 1 June

    Smart Watches & Fitness Trackers Can Spy ATM PIN and Unlock Smart Phones

    Smart Watches & Fitness Trackers Can Spy ATM PIN and Unlock Smart Phones

    Smart Watches and Fitness Trackers: IoT has extends the connectivity of physical devices beyond the standard devices, it affects the daily lives of users and even their information security. Wearables has increases the efficiency of data gathering, The researchers from University of Michigan and University of South Carolina found it …

  • 1 June

    Secure Router Configuration

    Secure Router Configuration

    Secure Router Configuration: One of the most important things you can do to secure your network is to secure the router. Though this is basic common sense, it is too often overlooked in the rush to finish the router configuration and move on the next job. To configure the router …

  • 1 June

    Creating a Test Setup Lab

    Creating a Test Setup Lab

    What You Will Need: In order to build a proper lab you will need to do several things first, some optional and other not. I recommend putting down some important foundations first. Make sure you have a good understanding of what you are trying to accomplish, and don’t just start …

May, 2018

  • 31 May

    Why Build a Lab? The Build Process

    Why Build a Lab? The Build Process

    Why Build a Lab: So which should you become fluent with or concentrate on when testing or training? I have included a list of tools later in this post, where you should consider getting familiar with in order to prepare properly for the test. NOTE: The list is s short …