Menu
ls111's Cybersecurity Blog
  • Home
  • Contact
ls111's Cybersecurity Blog

Category: General Cybersecurity

How to switch from XFCE to GNOME 42 on Kali Linux 2022.2

Posted on May 18, 2022September 19, 2023 by wp_writer

Hey all and welcome to my channel! Kali Linux 2022.2 was released this week and among the many great new features in this release is the ability to install the latest GNOME 42 desktop to give your Kali a fresh modern feel. In this short video I will show you how to install the GNOME…

How hackers launch phishing attacks (Social Engineering) 🎣

Posted on January 13, 2022September 19, 2023 by wp_writer

In this video we will go on a little phishing trip! I will show you a two phased approach how a hacker can potentially launch a phishing attack against their victims. We will be using two tool, the first is ZPhisher, a phishing automation script, that allows us to host various login pages to harvest…

How Hackers Steal Your Stored Chrome Passwords

Posted on January 11, 2022September 19, 2023 by wp_writer

In this video we continue where we left off in the previous video, where we gained access to a vulnerable Windows 10 machine via a weak RDP username and password. Now that we have our initial foothold, I will now show you a easy way to access the users stored passwords in the Google Chrome…

Using Hydra to Attack Windows Remote Desktop (RDP)

Posted on January 5, 2022September 19, 2023 by wp_writer

Hey all and welcome back to my channel! In this lab I will show you how to perform a basic Nmap port scan against a Windows 10 host to assess for any open RDP ports. We will then user a popular tool installed on Kali Linux called Hydra, to attack and brute force the username…

Enumerate Users & Brute Force Attack WordPress using WPScan

Posted on December 31, 2021September 19, 2023 by wp_writer

In this video we explore WPScan’s ability to enumerate usernames and brute force attack a vulnerable WordPress website using Kali Linux. We will also discuss possible mitigation techniques in the form of strong, unpredictable usernames and passwords, as well as explore a popular web application firewall (WAF) call Wordfence that can be used to further…

Using WPScan to Scan WordPress Sites & Setup RCE Attacks

Posted on December 29, 2021September 19, 2023 by wp_writer

With WordPress being as popular as it is, with and estimated 43% of websites online today using this content management system. It is super important that we as cybersecurity professionals know how to scan for vulnerabilities and protect against the many attacks these websites face on a daily basis. In this video I will show…

Do you REALLY need a home lab to be successful at Cyber Security or IT?

Posted on December 20, 2021September 19, 2023 by wp_writer

Hey all! Today we answer the question, do you really need a home lab to be successful at cyber security or IT in 2021? Well, the short answer is NO. In this short video I discuss the pro’s and con’s to running a home lab, as well as many alternative solutions, such virtualization, Packet Tracer,…

A Quick Way to Install Kali 2021.4 in VirtualBox

Posted on December 15, 2021September 19, 2023 by wp_writer

I have put together a quick how to video to show you how to install the latest version of Kali Linux 2021.4 in VirtualBox on a Windows host. The latest version of Kali comes with some nice new additions including: Improved Apple M1 processor support. Compatibility improvements for Samba. Easier switching package manager mirrors. Kaboxer…

Network Security: Passive vs Active Reconnaissance 🔎

Posted on December 8, 2021September 19, 2023 by wp_writer

Cyber attacks on computer systems according to The Unified Kill Chain model created by Paul Pols, describes the phased and strategic progressions a bad actor may follow to gain an initial foothold into a system, right through to the exfiltration of data and other negative impacts. Before an attacker reaches these late phases of the…

Cybersecurity vs Cyber Security: One or two words? 🤔

Posted on December 7, 2021September 19, 2023 by wp_writer

Hey guys, so this is officially the very first entry I am making into my snazzy new blog. I plan to share and document my adventures as I explore and learn the ever-evolving intricacies of the cybersecurity craft. I am hoping that this information will be of some use to whoever stumbles upon it. Anyway,…

  • Previous
  • 1
  • 2

Welcome to my blog! I discuss and showcase various cybersecurity topics. If you prefer to learn through watching video, please check out my YouTube channel, most of the content here also has a video version.

YouTube Channel
GitHub

Search by Category

  • Active Directory
  • Blue Team/Defensive
  • Cyber Security Lab Building Series
  • datadog
  • docker
  • Elasticsearch
  • General Cybersecurity
  • Kibana
  • Logstash
  • Network Security
  • OPNSense Firewall
  • Red Team/Pen Testing
  • SASE
  • Security Compliance
  • SIEM
  • Splunk Enterprise
  • TryHackMe Labs
  • Ubuntu Linux
  • Virtualization
  • Wazuh SIEM & XDR
  • Zenarmor NGFW

Search by Date

  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • December 2022
  • October 2022
  • September 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
©2025 ls111's Cybersecurity Blog | Powered by Superb Themes