In this video we explore WPScan’s ability to enumerate usernames and brute force attack a vulnerable WordPress website using Kali Linux. We will also discuss possible mitigation techniques in the form of strong, unpredictable usernames and passwords, as well as explore a popular web application firewall (WAF) call Wordfence that can be used to further…
Using WPScan to Scan WordPress Sites & Setup RCE Attacks
With WordPress being as popular as it is, with and estimated 43% of websites online today using this content management system. It is super important that we as cybersecurity professionals know how to scan for vulnerabilities and protect against the many attacks these websites face on a daily basis. In this video I will show…
A Quick Way to Install Kali 2021.4 in VirtualBox
I have put together a quick how to video to show you how to install the latest version of Kali Linux 2021.4 in VirtualBox on a Windows host. The latest version of Kali comes with some nice new additions including: Improved Apple M1 processor support. Compatibility improvements for Samba. Easier switching package manager mirrors. Kaboxer…
Network Security: Passive vs Active Reconnaissance 🔎
Cyber attacks on computer systems according to The Unified Kill Chain model created by Paul Pols, describes the phased and strategic progressions a bad actor may follow to gain an initial foothold into a system, right through to the exfiltration of data and other negative impacts. Before an attacker reaches these late phases of the…
Cybersecurity vs Cyber Security: One or two words? 🤔
Hey guys, so this is officially the very first entry I am making into my snazzy new blog. I plan to share and document my adventures as I explore and learn the ever-evolving intricacies of the cybersecurity craft. I am hoping that this information will be of some use to whoever stumbles upon it. Anyway,…