I wanted to get another post out since it has been so long. This time, it was for a good reason. I have been busy with projects and a little research. First, I have finally decided to work on getting my CCNA and CCNA:Security certification. I grabbed some cisco equipment from ebay and created a network lab for studying. I will hopefully complete this by the end of the summer. I have some cisco books to use while I am using the switches/routers consoles. I also started some research on the Google tool "Reaver", which can crack wireless networks using the WPS vulnerability. I did not just want to show I can use the tool like any 10 grader could. I wanted to see what the average user could do to prevent it. From what I found, not much more than turning off WPS to begin with. Even that is not as easy as it sounds. There are a lot of vendor that still turn it on without your knowledge. I went through a few for about two weeks.
I am still doing the usual fuzzing of application software to find 0-day vulnerabilities. I have received a lot of denial of service errors, however, I have not reach the holy grail "RCE". I am sure I will get there eventually. There are plenty of software apps to test. I just want to mention, if you have not tried the Offensive Security Certified Expert (OSCE) course yet. Do it! You cannot stop testing after you have taking the course by the OffSec guys.
Lastly, I am about to take a VMware Vsphere course. It will give some skills for VMware ESXi v5 and Vsphere 5. It should be very informative. After that is done, I am sure I will be going for the VCP 5.0 certification. I have the VCP 3.0 certification and I think it about time for me to check out what new lessons they have. I will give more details in later posts but I wanted to get something down.
Beginner’s Guide to Pentesting
10 months ago