46 F
Los Angeles
Thursday, February 21, 2019

Create a user in Active Directory 2016

First, run "Active Directory Users and Computer" Create an Organizational Unit under your domain(in this lab, "lab.local") Right-click on the selected OU, click "User" to create a user. We are going to...

“The network bridge on device ‘VMnet0’ is not running” error

The other day, I was setting an Active Directory lab using VMware workstation 12. After I installed Windows Server 2016 and Windows 10 client, they wouldn't communicate each other. ...

MAC Filtering – Part 2 : Whitelist

Case 2 (Hey wait.. what was "Case 1" ??) What if Bob is not just an annoying customer of a local cafe but he is actually a malicious user within your enterprise network?...

MAC Filtering – Part 1 : Blacklist

Case 1 Let's say you are the owner of a small local cafe and there is this annoying customer named Bob who comes every day, order a dollar coffee and stays forever. Not...

Fun with Android phone(Reverse_TCP, Camera control, Dump contacts remotely)

We all have been told a rooted android phone is vulnerable. That brings me an additional question; "If an android phone is not-rooted, out-of-box condition, is it safe then?" In...

“Steghide”, a Steganography tool

  Steganography Having sophisticate abnormal activity detection devices would mitigate infiltration attempts from outside of the organization. But how about if the threat is inside of your organization already and has some access...

WEP password cracking

1. Introduction Wired Equivalent Privacy (WEP) is arguably the weakest encryption protocols. Unlike how its name sounds, the WEP standard was found to be flawed and highly vulnerable. Sadly it is...

Why do we update Firefox?(XPI add-on and Reverse TCP)

1. Introduction A few years back I was working as a tech support. One day I got a call from one of the co-workers who claimed his internet speed is extremely...

How to engage a MITM Attack using ARP Spoofing

In this posting, you’ll see the basics of MITM(Man-in-the-Middle) attack. This demonstration should help you to understand the essential processes of a MITM attack.   For this lab, I created three virtual client systems; Windows...

Stay connected

14,390FansLike
1,315FollowersFollow
9,602SubscribersSubscribe
- Advertisement -

Latest article

Apparmor: A Linux Security Module(LSM)

Last year I was at my client's office for assessment. The IT manager introduced me to the team and that's when I saw the...

Hash? When do we need it?

Characteristics In the previous posting, we talked about why do we need hash and today we will talk about when do we need the hash. Hash is...

Kali Linux returns a GPG error

I was trying to create a Kali Linux VM the other day and the internet was really slow out of sudden. It was one of...