Details how to integrate jasypt (http://www.jasypt.org/) into a Spring Boot project to provide encryption for externalized properties.
Demonstration of macOS’s Automator app receiving a voice command that executes a script that scans for open listening ports on a machine and then terminates those processes that haven’t been whitelisted.
Discusses creating a service that will generate files to help monitor user activity and alert enterprise security teams of data breaches.
High-level overview of how a SIEM could be integrated into an enterprise environment by adopting and scaling the architecture model used in this NSM lab.
Security Awareness Training (SAT) – “Free” WiFi: Identifying Credential Harvesting Captive Portals and How to Protect Yourself Against Them
Exploits: CVE-2017-7269, CVE-2014-4076
Techniques: HTTP / WebDAV method enumeration, Privilege Escalation […]
Exploits: Drupal 7.54 Services Module RCE, CVE-2014-4113 Kernel Exploit
Techniques: Empire / Metasploit session passing, Fuzzing, Privilege Escalation […]