EH-Net - Steph Ihezukwu - BBP: You’ve Just Been Promoted...

BBP: You’ve Just Been Promoted…

“So, I heard back from the team. They really liked you, but I had no idea that you’ve just been promoted. The policy is that if you’ve been promoted, you have to ...
Zoom for macOS Has a Couple of Dangerous Zero-Day Vulnerabilities

Zoom for macOS Has a Couple of Dangerous Zero-Day Vulnerabilities

A couple of zero-day vulnerabilities found in the MacOS version of the Zoom video conferencing application could let attackers elevate their rights to root or to gain access to the microphone and ...
EH-Net - Osanda - WMI 101 for Pentesters

WMI 101 for Pentesters

PowerShell has gained popularity with SysAdmins and for good reason. It’s on every Windows machine (and now some Linux machines as well), has capabilities to interact with almost every service on every ...
EH-Net - Steph Ihezukwu - BBP: My Path to the CISO Chair

BBP: My Path to the CISO Chair

Testing, testing. May I have your attention, please. *Ahem* Allow me to introduce myself and this new series of articles for The Ethical Hacker Network. My name is Stephanie, better known as ...
EH-Net - Wyllie - Wireless Pentesting Part 2 - Building a WiFi Hacking Rig

Wireless Pentesting Part 2 – Building a WiFi Hacking Rig

In the first article of this series, “Wireless Pentesting Part 1 – An Overview”, we reviewed some penetration testing basics with the PTES and what one can expect to know about a ...
EH-Net - Wylie - Wireless Pentesting Part 1 – An Overview

Wireless Pentesting Part 1 – An Overview

As networks and computing systems have become more secure through the evolution of next generation firewalls, intrusion prevention systems (IPS), and endpoint security, attackers have shifted their focus. Web applications, mobile devices ...
EH-Net - Wylie - Manual Vulnerability Detection

Manual Vulnerability Detection

Typically during penetration tests, scanners are used to detect vulnerabilities. Sometimes security professionals may want to go undetected to test the response of the blue team (aka defensive security) and the security ...
EH-Net - Daw - Ease Me Into Cryptography Part 4: TLS

Ease Me Into Cryptography Part 4: TLS – Applied Cryptographic Foundations

You made it to part 4! Here’s a quick overview of what we have broken down so far. We started with some basic vocabulary for cryptographic building blocks and talked about hash ...
EH-Net - Daw - Ease Me Into Cryptography Part 3: Asymmetric Ciphers - Asymmetric Cyphers

Ease Me Into Cryptography Part 3: Asymmetric Ciphers

| | /root, cipher, Crypto, daw, highlight, python, Tutorial
Welcome to Part 3! A quick recap of where we’ve been. In Part 1: Buzzwords and Hash Function we talked about some foundational cryptography vocab and were introduced to hash functions, how ...
EH-Net - Daw - Ease Me Into Cryptography Part 2: Symmetric Ciphers - Symmetric Cyphers

Ease Me Into Cryptography Part 2: Symmetric Ciphers

| | /root, cipher, Crypto, daw, highlight, python, Tutorial
In the first article in this series on the basics of crypto, "Ease Me Into Cryptography Part 1: Buzzwords and Hash Function", we learned some lingo and talked about the different aspects ...