We at VeteranSec have launched a new video for those hoping to break into cybersecurity. We performed a mock interview with a close friend, Cage Vernon, who is looking to break into cyber as a SOC analyst. Cage had no previous knowledge of the questions that I was going to ask. He was subjected to
In this video, I’ll show you how to perform a man-in-the-middle attack using Responder on a Windows Active Directory environment. Wanna chat? Add me on Twitter or LinkedIn! Veteran? Join our Slack!
In this video, we will cover how to use breached password lists to gain entry into internal networks. Wanna chat? Add me on Twitter or LinkedIn! Veteran? Join our Slack!
In this video, I’ll show you how a bump key can be used to bypass a common residential lock. Bump keys can be an important tool in physical penetration tests as it is common to see interior doors, including network closets, with basic locks. To purchase the Sparrows bump key set used in this video,
Introduction: This article is intended for anyone interested in the concept of wardriving. We will cover a written, how to, setup tutorial that will walk you through the hardware and tools needed to successfully perform wardriving. There is also a video tutorial that shows wardriving in action. The written section is meant to be more
Video Walkthrough: Wanna chat? Add me on Twitter or LinkedIn! Veteran? Join our Slack!
Introduction: Hello! I’m writing this article to share my experiences in finding my first job in cyber security. More specifically, my first job in penetration testing. I wanted to share my experiences in hopes of motivating others who want to come into the cyber security field or already are applying to jobs in the field,
Video tutorial: Written tutorial: Hello everyone! Welcome to my first post here at VetSec. For my first blog, I thought it would be helpful to provide a walkthrough of a 32-bit Windows buffer overflow. For most people breaking into cyber security, buffer overflows can be hard for someone to wrap their mind around. My goal