A good explanation of the differences between the two, many managers think Penetration Testing sounds more exciting, but actually in the majority of cases it’s a Vulnerability Assessment that’s carried out. —————————– Not a bad little article. One thing that he fails to mention (or I just missed it) was that penetration testing is usually […]
Nmap is a security tool written by Fyodor. It is an opensource security tool which is licensed under the GNU GPL. Nmap is what is called a network scanner. It is not a vulnerablility scanner like nessus. A decent analogy would be if you had an address to a particular house and wanted to figure […]
NIST created guidelines for selecting and specifying security controls for information systems that support the executive agencies of the U.S. government. read more | digg story I plan on writing my own article about NIST documentation. However, this is a decent little introduction to NIST 800-53 and the direction of NIST security controls.
This is a Discussion of Casablanca over at movietap. Here are my initial comments: This is a great movie. I finally got my wife to watch this several months ago. I had to convince her it was a love story instead of a “war movieâ€Â. Apparently, she has something against war movies. She almost left […]
So, now we are hopefully capturing traffic and saving IVs to crackme.ivs for channel 10. Now we must generate traffic by doing an active attack (or we could be sniffing traffic for weeks on a low use WAP). To do this we are going to use aireplay. So, the first thing we need to do […]