MD5 for Software Validity I beleive all of us have tried to download an installer through a website. But, have you ever question the integrity of that installer you downloaded? This is where checksum and hashing comes in. These are the components that we will be comparing to find out about the validity of a… Continue reading Encryption and Hashing
Category: SEC602 Systems Security
Scanning and Remediating Vulnerabilities with OpenVAS
Figure 1. SSL Vulnerability from OpenVAS scan SSL Vulnerability in Lab 5 On a OpenVAS Scan executed in a Windows Server system, a severity level of 5.0 (medium) is shown. This LDAP scan shows several vulnerabilities and one of the is an SSL vulnerability which is a weak SSL cipher with 5.0 severity level. It… Continue reading Scanning and Remediating Vulnerabilities with OpenVAS
Network Vulnerabilities Part 2
DoS Attack Scenario DoS stands for Denial of Service which is a method used by penterators to overload a server with high amount of traffic which causes a disruption of its service to the intended users. A DoS attack only uses one computer to target a system in a network. In the real world, DoS… Continue reading Network Vulnerabilities Part 2
Network Vulnerabilities Part 1
Summary of the Lab Network The network consists of several Windows and Linux machines that presented themself in a Star Topology. There are 5 Windows machine and 3 Linux machine From analyzing the network ports through Zenmap, it can be seen that there are several vulnerable hosts which are mostly Windows machines. Seen from the… Continue reading Network Vulnerabilities Part 1
Establish Host Security
Windows Defender Windows Defender is basically a built-in antivirus that Microsoft provides and already pre-installed since Windows 8. It equips your PC with real-time protection against all kinds of threats such as viruses and malwares. One of the benefits is that Windows Defender is easy to use and doesn’t really distract your system as it… Continue reading Establish Host Security
Social Engineering Reconnaissance
Summarise the key information gathered from MyBook Name : Phillip Nomad (a.k.a. Phil)Date of Birth : 4 February 1990 (29 y.o.)Address : around Kingston upon Thames, London, UK Phone Num : +44 7704 256 110 Education : Oxford Univ – Computer Science Job title : Front end software engineer - Creative Director Work Experience :… Continue reading Social Engineering Reconnaissance