CVE-2016-8655 Five-Year-Old Linux Kernel Local Privilege-Escalation Vulnerability Discovered

A five-year-old serious privilege-escalation vulnerability has been discovered in the Linux kernel that affects almost every distro of the Linux operating system, including Red Hat and Ubuntu. Back in October, a nine-year-old privilege-escalation vulnerability, dubbed Dirty COW was discovered in the Linux kernel that affected every distro of the open-source operating system, including Red Hat, [...]

By | December 7th, 2016|Linux, Security|

Fix Wireless Limited Access Default Gateway Not Available Windows 10

While using a Dell Latitude E7250 and even a Microsoft Surface 4 Pro, I recently came across an issue where the wireless connection would show the yellow exclamation point and say Limited Connectivity. While running the Troubleshoot Problems Windows troubleshooter, it would display The Default Gateway is not available. The Windows troubleshooter would reset the [...]

By | December 2nd, 2016|Tech Tips|

Microsoft Edge and Internet Explorer 11 Will Block Websites with SHA-1 Certificates

Beginning February 14th, 2017, the Microsoft Edge browser and Internet Explorer 11 (IE11) will start blocking websites with a SHA-1 certificate. The browsers will prevent sites that are protected with a SHA-1 certificate from loading and will display an invalid certificate warning. Users will have the option to ignore the error and continue to the [...]

By | November 21st, 2016|Internet|

Review: OLALA 7500mAh Slide Portable Charger Power Bank with Built-in Lightning USB Cable

Over the past week, I've had the opportunity to try out the [Apple MFi Certified] OLALA 7500mAh Slide Portable Charger Power Bank with Built-in Lightning USB Cables Dual USB Ports External Battery Pack. This device is a portable external battery pack that features a built-in lightning cable to charge your iPhone or iPad along with [...]

By | November 6th, 2016|Reviews|

How To Reset Active Directory User Password Expiration Date

Active Directory account passwords are usually set to expire (for example: every 90 days) in most organizations. Configuring an AD account with PasswordNeverExpires is not recommended due to security. There might be a time where you need to extend an active directory account’s current password expiration date without changing the password expiration policy or changing [...]

By | November 4th, 2016|System Administration, Windows|

Install YAWAST – The Antecedent Web Application Security Toolkit

YAWAST is an application meant to simplify initial analysis and information gathering for penetration testers and security auditors. It performs basic checks in these categories: TLS/SSL - Versions and cipher suites supported; common issues. Information Disclosure - Checks for common information leaks. Presence of Files or Directories - Checks for files or directories that could [...]

By | October 24th, 2016|Pentest|

QRLJacker – QRLJacking Exploitation Framework

QRLJacker is a python framework which is used to exploit services that rely on QR code authentication. #QRLJacker is a customizable framework to demonstrate "QRLJacking Attack Vector" and shows how easy to hijack services that relies on QR Code Authentication. Installation Installation on Windows After downloading the framework and Python: cd QrlJacking-Framework pip install -r [...]

By | October 24th, 2016|Pentest|
Load More Posts