Cain & Abel Cain & Abel is one of the tool that is able to do a brute force attack in a local active directory system, text file or SAM (Security Account Manager) database. For executing a brute force attack with Cain & Abel, you would need to choose which source of hashes to search… Continue reading Password Cracking Tools
Author: Marcellus Christofan
Encryption and Hashing
MD5 for Software Validity I beleive all of us have tried to download an installer through a website. But, have you ever question the integrity of that installer you downloaded? This is where checksum and hashing comes in. These are the components that we will be comparing to find out about the validity of a… Continue reading Encryption and Hashing
Scanning and Remediating Vulnerabilities with OpenVAS
Figure 1. SSL Vulnerability from OpenVAS scan SSL Vulnerability in Lab 5 On a OpenVAS Scan executed in a Windows Server system, a severity level of 5.0 (medium) is shown. This LDAP scan shows several vulnerabilities and one of the is an SSL vulnerability which is a weak SSL cipher with 5.0 severity level. It… Continue reading Scanning and Remediating Vulnerabilities with OpenVAS
Perceiving Knowledge Paradigms
Positivism and Realism Paradigm Both of this paradigm pairs together their view of science in an objective way of finding out the nature of reality. Realism is derived from the Ontology philosophy where it believes that the reality exists out there somewhere in the universe and are waiting to be found out. On the other… Continue reading Perceiving Knowledge Paradigms
Lab 4 Working with vCenter Server
Log in to your vSphere Client before starting this Lab. Information about log in interface can be reviewed here. It is required to have ESXi and a Windows Server installed and configured previously for the VMWare vCenter Server Appliance (VCSA) to work. What I have done before this lab is creating two ESXi hosts and… Continue reading Lab 4 Working with vCenter Server
Lab 3 Deploying and Configuring a Virtual Machine
Log in to your vSphere Client before starting this Lab. Information about log in interface can be reviewed here. Create a Virtual Machine Access the VMs and Templates tab from the navigation pane. Expand the folders and find your own folder to put in the virtual machine in. In my case I will use the… Continue reading Lab 3 Deploying and Configuring a Virtual Machine
Lab 5 Navigating The vSphere Client
vSphere Client We are going to explore the interfaces of vSphere through the vSphere client first. The specific URL address I visited was "nt-vcsa.talos.net.nz" and a page will be shown like this following screenshot. Figure 1. vSphere client options page Click on the Launch vSphere Client (HTML5) button and it will direct you to the… Continue reading Lab 5 Navigating The vSphere Client
Network Vulnerabilities Part 2
DoS Attack Scenario DoS stands for Denial of Service which is a method used by penterators to overload a server with high amount of traffic which causes a disruption of its service to the intended users. A DoS attack only uses one computer to target a system in a network. In the real world, DoS… Continue reading Network Vulnerabilities Part 2
Network Vulnerabilities Part 1
Summary of the Lab Network The network consists of several Windows and Linux machines that presented themself in a Star Topology. There are 5 Windows machine and 3 Linux machine From analyzing the network ports through Zenmap, it can be seen that there are several vulnerable hosts which are mostly Windows machines. Seen from the… Continue reading Network Vulnerabilities Part 1
The Concept of Existence and Knowledge
A Study of Existence There is a common terminology to define the classification of existence, to know whether something exist or not, and it is called Ontology. It is a concept of creating something that seems abstract and characterize it as something real. Ontology discovers more about the fundamental concept of the nature of something.… Continue reading The Concept of Existence and Knowledge