Search for tag: "scarbrough"

Practicum - VPN and vSphere Access

This video tutorial provides instruction on accessing the the SEAD Practicum virtual environment by using a VPN/vSphere client

From  jscarbrough@regis.edu 10 plays 0  

Creating Captions for Video Presentations and Tutorials

This video tutorial demonstrates how to create captions for video presentations and tutorials. Currently MediaSpace only accepts SRT and DFXP caption formats. This video provides general direction…

From  jscarbrough@regis.edu 8 plays 0  

Network Penetration - WPA/WPA2 Wi-Fi Attack

This video tutorial describes how to hack WPA/WPA2 Wi-Fi using Kali Linux and the aircrack-ng toolset. This video describes how to capture network traffic and then target a specific Wireless Access…

From  jscarbrough@regis.edu 14 plays 0  

Virtual Lab Environment 1-10 External Attack Network Setup Part 2

This video presentation expands on the virtual lab setup of re-structuring the virtual environment to simulate an external attack. This is the last of a two-part expanded video presentation that…

From  jscarbrough@regis.edu 7 plays 0  

Ubuntu Server 14.04 LAMP - Install and Setup Wordpress

This video presentation demonstrates how to install and setup Wordpress on a Ubuntu Server 14.04 LAMP.

From  jscarbrough@regis.edu 5 plays 0  

Ubuntu Server 14.04 LAMP - Install and Setup Drupal

This video presentation demonstrates how to install and setup Drupal on Ubuntu Server 14.04 LAMP.

From  jscarbrough@regis.edu 14 plays 0  

Ubuntu Server 14.04 - Setup LAMP and Open SSH/FTP

This video presentation demonstrates how to setup a LAMP (Linux, Apache Web Server, mySQL, and PHP) stack 0n an Ubuntu Server 14.04 LTS in VirtualBox. In addtion, both Open SSH Server and vsftp are…

From  jscarbrough@regis.edu 11 plays 0  

Ubuntu Server 14.04 - Install

This video presentation demonstrates how to setup and install Ubuntu Server 14.04 LTS in VirtualBox.

From  jscarbrough@regis.edu 10 plays 0  

Virtual Lab Environment 1-9 - Setting up for a External Type Attack Network Part 1

This video presentation expands on the virtual lab setup by re-structuring the virtual environment to simulate an external attack. This is the first of a two-part expanded video presentation that…

From  jscarbrough@regis.edu 13 plays 0  

Virtual Lab Environment 1-8 - Summary and Demonstration

This video presentation summarizes the actions taken thus far to create a network penetration virtual lab environment. The video also provides a brief demonstration on conducting a network scan and…

From  jscarbrough@regis.edu 7 plays 0  

Network Penetration - Hail Mary Attack

This video presentation demonstrates how to perform a Hail Mary attack using Armitage on a Kali Linux computer. The exploit was specifically created for the 2014 Kansas Red Team Exercise, but is…

From  jscarbrough@regis.edu 25 plays 0  

Network Penetration - Windows 7.1 Professional Exploit

This video presentation demonstrates an exploit of a Windows 7 system using both the command line Metasploit framework and armitage

From  jscarbrough@regis.edu 18 plays 0  

Virtual Lab Environment 1-7 - Install Windows 7.1 Professional

This video demonstrates how to download and install an evaluation copy of Windows 7.1 Professional to be used within the Virtual Lab environment

From  jscarbrough@regis.edu 28 plays 0  

Virtual Lab Environment 1-6 - pfSense Router Configuration Part 2

This video presentation provides further instruction on the configuration of the pfSense router/firewall as related to the setup of a virtual network penetration lab.

From  jscarbrough@regis.edu 30 plays 0  

Virtual Lab Environment 1-5 - Installing Kioptrix Level 1

This video presentation demonstrates how to download and install the Kioptrix Level 1 virtual machine in Virtual Box. This virtual machine allows a novice network penetration tester to see if they…

From  jscarbrough@regis.edu 11 plays 0  

Virtual Lab Environment 1-4 - Installing Metasploitable 2

This video presentation demonstrates how to install a metasploitable virtual machine in Virtual Box. This virtual machine is an intentionally vulnerable Ubuntu Linux system. This virtual machine…

From  jscarbrough@regis.edu 13 plays 0