Menu
ls111's Cybersecurity Blog
  • Home
  • Contact
ls111's Cybersecurity Blog

Category: Red Team/Pen Testing

How hackers track your exact location 📌

Posted on January 18, 2022September 19, 2023 by wp_writer

Have you ever had that feeling that someone is following you? In this video I am going to show you how easy it is for a hacker to use a combination of social engineering and a Python tool called Seeker, to deceive their victims into revealing their exact location data by tapping into the GPS…

How hackers launch phishing attacks (Social Engineering) 🎣

Posted on January 13, 2022September 19, 2023 by wp_writer

In this video we will go on a little phishing trip! I will show you a two phased approach how a hacker can potentially launch a phishing attack against their victims. We will be using two tool, the first is ZPhisher, a phishing automation script, that allows us to host various login pages to harvest…

How Hackers Steal Your Stored Chrome Passwords

Posted on January 11, 2022September 19, 2023 by wp_writer

In this video we continue where we left off in the previous video, where we gained access to a vulnerable Windows 10 machine via a weak RDP username and password. Now that we have our initial foothold, I will now show you a easy way to access the users stored passwords in the Google Chrome…

Using Hydra to Attack Windows Remote Desktop (RDP)

Posted on January 5, 2022September 19, 2023 by wp_writer

Hey all and welcome back to my channel! In this lab I will show you how to perform a basic Nmap port scan against a Windows 10 host to assess for any open RDP ports. We will then user a popular tool installed on Kali Linux called Hydra, to attack and brute force the username…

Enumerate Users & Brute Force Attack WordPress using WPScan

Posted on December 31, 2021September 19, 2023 by wp_writer

In this video we explore WPScan’s ability to enumerate usernames and brute force attack a vulnerable WordPress website using Kali Linux. We will also discuss possible mitigation techniques in the form of strong, unpredictable usernames and passwords, as well as explore a popular web application firewall (WAF) call Wordfence that can be used to further…

Using WPScan to Scan WordPress Sites & Setup RCE Attacks

Posted on December 29, 2021September 19, 2023 by wp_writer

With WordPress being as popular as it is, with and estimated 43% of websites online today using this content management system. It is super important that we as cybersecurity professionals know how to scan for vulnerabilities and protect against the many attacks these websites face on a daily basis. In this video I will show…

Welcome to my blog! I discuss and showcase various cybersecurity topics. If you prefer to learn through watching video, please check out my YouTube channel, most of the content here also has a video version.

YouTube Channel
GitHub

Search by Category

  • Active Directory
  • Blue Team/Defensive
  • Cyber Security Lab Building Series
  • datadog
  • docker
  • Elasticsearch
  • General Cybersecurity
  • Kibana
  • Logstash
  • Network Security
  • OPNSense Firewall
  • Red Team/Pen Testing
  • SASE
  • Security Compliance
  • SIEM
  • Splunk Enterprise
  • TryHackMe Labs
  • Ubuntu Linux
  • Virtualization
  • Wazuh SIEM & XDR
  • Zenarmor NGFW

Search by Date

  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • December 2022
  • October 2022
  • September 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
©2025 ls111's Cybersecurity Blog | Powered by Superb Themes