In this episode we talk about a Raspberry Pi 3 project and vulnerability scanning. Dorothy talks about building a pen-testing system using a Raspberry Pi 3 and Kali Linux. She talks about why she chose this project, what she might learn along the way, and some of the steps she needs to take to accomplish […]

Read more

This week we talk about hacking into Metasploitable 2 with Metasploit and the Msfconsole. We also talk about additional challenges we face when applying for an IT job. We share some of our concerns, and how we plan to get the skills we need. Damien share’s his new found skill with Metasploit and the Msfconsole. […]

Read more

In this episode we talk about keeping what we’ve learned, a WannaCry clarification, and Joining the dark side. As with anything, IT skills are perishable. Use them or loose them. We talk about the skills we’ve lost, how we got them back and how we plan to keep them. We do a quick WannaCry clarification […]

Read more

In this episode, we search for exploits in Metasploit. Damien covers the search command, CVE’s, Microsoft security bulletins and more. Find the exploit code for WannaCry / WannaCrypt by searching for the CVE, or Microsoft Security Bulletin. Understanding CVE’s and other vulnerability information is a big part of security. This information can help you secure […]

Read more

In this episode we share our way of studying for an IT certification. Dorothy explains the importance of hands on experience. This includes hands on labs and review questions. NETWORK DIAGRAM LINKS Homework-EnterpriseNetwork – Dorothy’s review questions Cybrary – Free and Open Source Cyber Security Learning

Read more

In this episode we talk about WannCray, Kali Linux tools and IT Burnout. Everyone in IT has been talking about WannaCry. We focus on prevention and recovery. Damien talks about the Kali Linux tools he’s trying to learn. So far he’s looking into Recon-NG, Shodan and Metasploit. Dorothy want’s to share our experiences with IT […]

Read more

We recorded this episode on Saturday, 5-13-17. The day after the WannaCry ransomware attack. We explain what it is, what happened and share our experiences. We also share some of the problems we’ve run into with our projects. Dorothy does some network troubleshooting. I try to get the software required to follow our Kali Linux […]

Read more

We tried to do a less technical episode by diving into the CIS Google Chrome Benchmark. We ran into all kinds of issues with this project. However, we managed to pick a few settings that we think will work for us. We also share some stories about making it to episode 20. There were moments […]

Read more

We dive right into the CIS Ubuntu Linux 16.04 LTS Benchmark. We talk about what this is, level 1 and level 2 recommendations and several examples. This includes SSH, partitions, iptables, ufw and AIDE. We will be incorporating some of these recommendations into our own Ubuntu systems. We also go over future plans and projects. […]

Read more

In this episode, we modify the Auto Nmap script to meet our network requirements. We introduce Hping3, a tool that can modify ICMP packets to ex-filtrate data. And we continue the process of improving the maintenance of our network. Auto SSH Script AutoNmapScript – pdf file Crontab Command: 0 4 * * * /usr/local/autonmap/autonmap.sh > /dev/null […]

Read more