A regional bank hires your company to perform a security assessment on their network after a recent data breac
A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server.
Port scanning can be used as part of a technical assessment to determine network vulnerabilities. The TCP XMAS
Port scanning can be used as part of a technical assessment to determine network vulnerabilities. The TCP XMAS scan is used to identify listening ports on the targeted system.
During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demil
During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (D…
This tool is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets ha
This tool is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. I…
The Heartbleed bug was discovered in 2014 and is widely referred to under MITRE-s Common Vulnerabilities and E
The Heartbleed bug was discovered in 2014 and is widely referred to under MITRE-s Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160. This bug affects the OpenSSL implementation of the transport layer security (TLS) protocols defined in RFC6520.
In 2007, this wireless security algorithm was rendered useless by…
In 2007, this wireless security algorithm was rendered useless by…
Your company performs penetration tests and security assessments for small and medium-sized business in the lo
Your company performs penetration tests and security assessments for small and medium-sized business in the local area. During a routine security assessment, you discover…
Jesse receives an email with an attachment labeled -Court_Notice_21206.zip-. Inside the zip file is a…
Jesse receives an email with an attachment labeled -Court_Notice_21206.zip-. Inside the zip file is a…
Which tool allows analysts and pen testers to examine links between data using graphs and link analysis?
Which tool allows analysts and pen testers to examine links between data using graphs and link analysis?
While using your bank-s online servicing you notice the…
While using your bank-s online servicing you notice the…