Monthly Archives: February 2014

Breaking Wireless WPA2

You’ll need Backtrack with metasploit airmon-ng airodump-ng aireplay-ng aircrack Verify your wireless is up, airmon-ng start wlan0 airodump-ng mon0 Find a BSSID MAC address to become a toe (target of evaluation) Stop the program Gather the MAC address and Channel … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Breaking Wireless WPA2

Drone Hacking with SkyJack

Samy Kamkar (creator of the Samy worm) has an awesome video on his program, Skyjack: Autonomous Drone Hacking. Here is Samy’s page on how to perform a skyjack attack. He lists the entire inventory with Amazon links to hardware so … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on Drone Hacking with SkyJack

Pass the Hash on Windows 8.1

On this website are instructions on how to pass the hash on Windows 8.1. Microsoft claimed that they patched the Pass the Hash exploit in October of 2013. Of course this is a proof of concept and some of the … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Pass the Hash on Windows 8.1

QualysGuard

Need to learn Qualys? They offer free training on their website in video format. What is QualysGuard you ask? It’s basically a network scanning tool to scan networks to discover new or existing devices, perform compliance and vulnerability checks, and … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on QualysGuard

Scottsdale Family Fun Day

Almost every year, Scottsdale Insurance Company has a large picnic over at McCormick ranch and Jaime gets to bring up to 5 people. Damien didn’t want to go, but Pat and Courtney did. We had a lot of fun. We … Continue reading

Posted in life | Comments Off on Scottsdale Family Fun Day

Nigerian Scams

Don’t fall for this…    

Posted in Security Blog | Tagged , , , , | Comments Off on Nigerian Scams

My InfoSec Board on Pinterest

Follow It’s Carmelo!’s board Infosec on Pinterest.

Posted in Security Blog | Tagged , | Comments Off on My InfoSec Board on Pinterest

Installing Crouton and Kali on a Chromebook

Crouton is short for the Chromium OS Universal Chroot Environment. The below instruction will allow you to install two separate OSs on your Chromebook and allow for switching in between them (AND they will have a shared folder, downloads, to … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Installing Crouton and Kali on a Chromebook

Bruce Schneier: The Security Mirage

My CISO brought this up today, so I’m posting it to watch it.

Posted in Security Blog | Tagged , , , , , , | Comments Off on Bruce Schneier: The Security Mirage

More Passwords on TV

It’s been more common to post your passwords on television (like here), lol Graham Cluley shows on his site more like the image below.

Posted in Security Blog | Tagged , , | Comments Off on More Passwords on TV