Menu
ls111's Cybersecurity Blog
  • Home
  • Contact
ls111's Cybersecurity Blog

Enumerate Users & Brute Force Attack WordPress using WPScan

Posted on December 31, 2021September 19, 2023 by wp_writer

In this video we explore WPScan’s ability to enumerate usernames and brute force attack a vulnerable WordPress website using Kali Linux. We will also discuss possible mitigation techniques in the form of strong, unpredictable usernames and passwords, as well as explore a popular web application firewall (WAF) call Wordfence that can be used to further…

Using WPScan to Scan WordPress Sites & Setup RCE Attacks

Posted on December 29, 2021September 19, 2023 by wp_writer

With WordPress being as popular as it is, with and estimated 43% of websites online today using this content management system. It is super important that we as cybersecurity professionals know how to scan for vulnerabilities and protect against the many attacks these websites face on a daily basis. In this video I will show…

Do you REALLY need a home lab to be successful at Cyber Security or IT?

Posted on December 20, 2021September 19, 2023 by wp_writer

Hey all! Today we answer the question, do you really need a home lab to be successful at cyber security or IT in 2021? Well, the short answer is NO. In this short video I discuss the pro’s and con’s to running a home lab, as well as many alternative solutions, such virtualization, Packet Tracer,…

A Quick Way to Install Kali 2021.4 in VirtualBox

Posted on December 15, 2021September 19, 2023 by wp_writer

I have put together a quick how to video to show you how to install the latest version of Kali Linux 2021.4 in VirtualBox on a Windows host. The latest version of Kali comes with some nice new additions including: Improved Apple M1 processor support. Compatibility improvements for Samba. Easier switching package manager mirrors. Kaboxer…

Network Security: Passive vs Active Reconnaissance 🔎

Posted on December 8, 2021September 19, 2023 by wp_writer

Cyber attacks on computer systems according to The Unified Kill Chain model created by Paul Pols, describes the phased and strategic progressions a bad actor may follow to gain an initial foothold into a system, right through to the exfiltration of data and other negative impacts. Before an attacker reaches these late phases of the…

Cybersecurity vs Cyber Security: One or two words? 🤔

Posted on December 7, 2021September 19, 2023 by wp_writer

Hey guys, so this is officially the very first entry I am making into my snazzy new blog. I plan to share and document my adventures as I explore and learn the ever-evolving intricacies of the cybersecurity craft. I am hoping that this information will be of some use to whoever stumbles upon it. Anyway,…

  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5

Welcome to my blog! I discuss and showcase various cybersecurity topics. If you prefer to learn through watching video, please check out my YouTube channel, most of the content here also has a video version.

YouTube Channel
GitHub

Search by Category

  • Active Directory
  • Blue Team/Defensive
  • Cyber Security Lab Building Series
  • datadog
  • docker
  • Elasticsearch
  • General Cybersecurity
  • Kibana
  • Logstash
  • Network Security
  • OPNSense Firewall
  • Red Team/Pen Testing
  • SASE
  • Security Compliance
  • SIEM
  • Splunk Enterprise
  • TryHackMe Labs
  • Ubuntu Linux
  • Virtualization
  • Wazuh SIEM & XDR
  • Zenarmor NGFW

Search by Date

  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • December 2022
  • October 2022
  • September 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
©2025 ls111's Cybersecurity Blog | Powered by Superb Themes