In this blog post, I want to show the utilization of the open source memory forensics tool: Google Rekall “Rekall is an advanced forensic and incident response framework. While it began life purely as a memory forensic framework, it has now evolved into a complete platform. Rekall implements the most advanced analysis techniques in theContinue reading “Digital Forensics With Google Rekall”
Category Archives: Uncategorized
Web Application Security
Since I have showcased some Red and Blue team security operations, I wanted to touch on Web application as well. I am utilizing the Web Security Dojo within Virtualbox to show various attacks on the well know and purposfully vulnerable DVWA. “Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable.Continue reading “Web Application Security”
Blue Team Showcase
This is a post to counter the Red Team showcase I made that focuses on using Kali Linux to exploit Metaspolitable 2. In this part, we aim to harden, fix, and defend against what we can with the tools at hand. Agenda will look like this: Nessus, Nmap, Qualys scans – baseline image Top vulnerabilityContinue reading “Blue Team Showcase”
Red Team Showcase
This is a showcase of some techniques that can be used against Metaspolitable via Kali Linux. Offensive Security! Nmap Discovery Scan Exploiting Port 21 FTP (Hydra) Exploiting VSFTPD 2.3.4 Exploiting Port 22 SSH Bruteforce Port 22 SSH (Nmap Bruteforce) Exploiting port 23 TELNET (Credential Capture) Exploiting TELNET (Bruteforce) Exploiting Port 80 (PHP) Exploiting Port 8080Continue reading “Red Team Showcase”