Blog Feed

Encryption and Hashing

MD5 for Software Validity I beleive all of us have tried to download an installer through a website. But, have you ever question the integrity of that installer you downloaded? This is where checksum and hashing comes in. These are the components that we will be comparing to find out about the validity of a… Continue reading Encryption and Hashing

Scanning and Remediating Vulnerabilities with OpenVAS

Figure 1. SSL Vulnerability from OpenVAS scan SSL Vulnerability in Lab 5 On a OpenVAS Scan executed in a Windows Server system, a severity level of 5.0 (medium) is shown. This LDAP scan shows several vulnerabilities and one of the is an SSL vulnerability which is a weak SSL cipher with 5.0 severity level. It… Continue reading Scanning and Remediating Vulnerabilities with OpenVAS

Perceiving Knowledge Paradigms

Positivism and Realism Paradigm Both of this paradigm pairs together their view of science in an objective way of finding out the nature of reality. Realism is derived from the Ontology philosophy where it believes that the reality exists out there somewhere in the universe and are waiting to be found out. On the other… Continue reading Perceiving Knowledge Paradigms

Lab 4 Working with vCenter Server

Log in to your vSphere Client before starting this Lab. Information about log in interface can be reviewed here. It is required to have ESXi and a Windows Server installed and configured previously for the VMWare vCenter Server Appliance (VCSA) to work. What I have done before this lab is creating two ESXi hosts and… Continue reading Lab 4 Working with vCenter Server

Lab 3 Deploying and Configuring a Virtual Machine

Log in to your vSphere Client before starting this Lab. Information about log in interface can be reviewed here. Create a Virtual Machine Access the VMs and Templates tab from the navigation pane. Expand the folders and find your own folder to put in the virtual machine in. In my case I will use the… Continue reading Lab 3 Deploying and Configuring a Virtual Machine

Lab 5 Navigating The vSphere Client

vSphere Client We are going to explore the interfaces of vSphere through the vSphere client first. The specific URL address I visited was "nt-vcsa.talos.net.nz" and a page will be shown like this following screenshot. Figure 1. vSphere client options page Click on the Launch vSphere Client (HTML5) button and it will direct you to the… Continue reading Lab 5 Navigating The vSphere Client

Network Vulnerabilities Part 1

Summary of the Lab Network The network consists of several Windows and Linux machines that presented themself in a Star Topology. There are 5 Windows machine and 3 Linux machine From analyzing the network ports through Zenmap, it can be seen that there are several vulnerable hosts which are mostly Windows machines. Seen from the… Continue reading Network Vulnerabilities Part 1

The Concept of Existence and Knowledge

A Study of Existence There is a common terminology to define the classification of existence, to know whether something exist or not, and it is called Ontology. It is a concept of creating something that seems abstract and characterize it as something real. Ontology discovers more about the fundamental concept of the nature of something.… Continue reading The Concept of Existence and Knowledge