Skip to content

Author Archives: Jeremy

Penetration Testing vs Vulnerability Assessment

A good explanation of the differences between the two, many managers think Penetration Testing sounds more exciting, but actually in the majority of cases it’s a Vulnerability Assessment that’s carried out. —————————– Not a bad little article. One thing that he fails to mention (or I just missed it) was that penetration testing is usually […]

Nmap, what is it and how do you use it?

Nmap is a security tool written by Fyodor. It is an opensource security tool which is licensed under the GNU GPL. Nmap is what is called a network scanner. It is not a vulnerablility scanner like nessus. A decent analogy would be if you had an address to a particular house and wanted to figure […]

Future of NIST

NIST created guidelines for selecting and specifying security controls for information systems that support the executive agencies of the U.S. government. read more | digg story I plan on writing my own article about NIST documentation. However, this is a decent little introduction to NIST 800-53 and the direction of NIST security controls.

A Discussion of Casablanca

This is a Discussion of Casablanca over at movietap.  Here are my initial comments: This is a great movie. I finally got my wife to watch this several months ago. I had to convince her it was a love story instead of a “war movie”. Apparently, she has something against war movies. She almost left […]

Cracking WEP PartII

So, now we are hopefully capturing traffic and saving IVs to crackme.ivs for channel 10. Now we must generate traffic by doing an active attack (or we could be sniffing traffic for weeks on a low use WAP). To do this we are going to use aireplay. So, the first thing we need to do […]