Search for tag: "mgoodwyn"

OWASP ZAP Overview For Website Vulnerability Scanning

An Overview Of Website Vulnerability Scanning With The OWASP Zed Attack Proxy (ZAP) In our previous discussion on website vulnerabilities, we reviewed XSS, path traversal, SQL injections, and…

From  mgoodwyn@regis.edu 78 plays 0  

The Rapid7 Nexpose Vulnerability Scanner

Nexpose is a unified vulnerability detection and management solution that scans networks to identify the devices running on them and to probe these devices for vulnerabilities. It analyzes the…

From  mgoodwyn@regis.edu 249 plays 0  

WinDirStat For Tech Support & Forensic Examination

Using WinDirStat For Tech Support And Forensic Examination. Please take note that as you hover over the colored blocks, that the paths of the directories and files are visible. This may have forensic…

From  mgoodwyn@regis.edu 47 plays 0  

Installing Active Directory On Server 2008 R2

Installing Active Directory On Server 2008 R2

From  mgoodwyn@regis.edu 24 plays 0  

Using Cobalt Strike With A XP Mode Virtual Machine

This episode illustrates how to work with Metasploit, Cobalt Strike and Armitage, as well as install an XP Mode virtual machine for pentesting.

From  mgoodwyn@regis.edu 17 plays 0  

Installing OSSIM - The Open-source Alien Vault SIEM

This episode illustrates how to install OSSIM, the open-source Alien Vault SIEM, and configure its' network components. As a caveat, if the OSSIM SIEM is to be utilized in a production…

From  mgoodwyn@regis.edu 1,052 plays 0  

Setting Up And Using The Nessus Vulnerability Scanner In Kali Linux

This video outlines how to set up and use the Nessus vulnerability scanner in Kali Linux.

From  mgoodwyn@regis.edu 32 plays 0  

Installing A MySql Server

In this video we will be installing a MySql server. We will then intentionally give the databases weak credentials, so as to facilitate our efforts at circumventing their security

From  mgoodwyn@regis.edu 21 plays 0