Oscar Rodriguez

229 Flips | 1 Magazine | 3 Likes | 2 Following | @OscarRodrig5sul | Keep up with Oscar Rodriguez on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Oscar Rodriguez”

What is Wireshark? What this essential troubleshooting tool does and how to use it

Wireshark is the world's leading network traffic analyzer, and an essential tool for any security professional or systems administrator. This free …

Wireshark

Advanced Nmap: Top 5 Intrusive Nmap Scripts Hackers & Pentesters Should Know

Nmap is more powerful than you know. With a few scripts, we can extend its functionality beyond a simple port scanner and start to identify details …

Web Servers

10 Networking Troubleshooting Tools To Try Today

Network problems are issues that everyone has from time to time. It can get annoying when it happens but it is a part of our connected world. Fortunately, there are tools available that make it easier to diagnose and troubleshoot these kinds of problems so that our work can resume.<p>We asked members …

Command-line

How to Find Windows Product Key via Command in Windows or Linux

Have you ever needed to find a Windows product key? Maybe you’re troubleshooting a Windows PC, planning on re-installing Windows 10 in a virtual …

Linux

How To: Use the Buscador OSINT VM for Conducting Online Investigations

For anyone using open source information to conduct an investigation, a balance between powerful tools and privacy controls are a must. Buscador is a …

Computer Hacking

A Python Cheat Sheet For Newbie Coders

Startup Stock Photos<p>Python is one of the best programming languages to learn. As you get started, this one-page reference sheet of variables, methods …

Python Programming

10 PowerShell cmdlets to speed network troubleshooting

The right PowerShell cmdlets can help you identify network issues and resolve connectivity problems quickly and easily. Here are 10 to get you …

Fsociety Hacking Tools Pack – Open Source Penetration Testing Framework

Password Attacks<p>For password attacks, the package consists of Cupp – To generate password list, Ncrack – network Authentication protocol amongst a …

JoomScan 0.0.6 - OWASP Joomla Vulnerability Scanner Project

OWASP Joomla! Vulnerability Scanner (JoomScan) is an open source project, developed with the aim of automating the task of vulnerability detection …

Information Security

5 Tools to Scan a Linux Server for Malware and Rootkits

There are constant level of high attacks and port scans on Linux servers all the time, while a properly configured firewall and regular security …

How to Hack WiFi Password Easily Using New Attack On WPA/WPA2

Looking for how to hack WiFi password OR WiFi hacking software? Well, a security researcher has revealed a new WiFi hacking technique that makes it …

Securing data and our digital infrastructure has become critical

For all its controversy and divisiveness, the 2016 U.S. presidential election provided a powerful lesson for securing the future of our critical …

New Method Discovered for Cracking WPA2 Wi-Fi Passwords

<b>Developers of the popular password cracking tool Hashcat have identified a new method that can in some cases be used to obtain a network’s Wi-Fi</b> …

Pen Testing Using Live Malware Becoming a Must

<b>BERLIN</b>–Penetration testing has come a long way in the last decade, evolving from a somewhat controversial practice to a de facto best practice in the …

8. Cyberstalking tools for reconnaissance - Nine must-have OSINT tools

Self-driving cars, as brilliant as they are, are not nearly as good as humans at dealing with uncertainty. David Held has an ...<p>James Stanger of …

How To: Perform Local Privilege Escalation Using a Linux Kernel Exploit

Getting root is considered the Holy Grail in the world of Linux exploitation. Much like SYSTEM on Windows, the root account provides full …

Linux

How To: The Top 80+ Websites Available in the Tor Network

There are nearly 100,000 unique onion service addresses online with over two million people using Tor every single day. Join me as I explore a small …

Privacy

10 basic Android terminal commands you should know

For a lot of us, the fact that we can plug our Android phone into a computer and interact with it is a big plus. Besides the times when we've broken …

Who should bear responsibility in cyber attacks on healthcare IT systems? - Eyes on APAC

On 20 July, the Singapore government revealed that the non-medical personal details of about 1.5 million patients who had visited SingHealth’s …

How to Inspect a Collection of Objects in Javascript with console.table

When building software in JavaScript, I often need to inspect an array of objects or object of objects.<p>One of my favorite methods for achieving this …

This dog accidentally ate an edible and got really, really high

When a teen’s dog accidentally ingested an edible, things quickly went left.<p>In a tweet on Tuesday, Seth Mersing posted a video of his 3-year-old dog …

How To: Detect Script-Kiddie Wi-Fi Jamming with Wireshark

Due to weaknesses in the way Wi-Fi works, it's extremely easy to disrupt most Wi-Fi networks using tools that forge deauthentication packets. The …

Wireshark

VPN vs DNS and Proxy Servers – Which is Best | Tech.Co

A VPN, Smart DNS and Proxy Server can each provide you with added layers of security to protect your privacy online, or help you to access services …

How to recover deleted files

With the right software, you can retrieve files you thought were lost forever.<p>You need a document, photo or other file that you're sure was deleted. You've searched your hard drive. You've scoured the Recycle Bin. No sign of it? Don't panic. As long as you act quickly, you can usually bring that …

Linux

10 more PowerShell cmdlets you can use instead of CMD commands

Learning PowerShell from scratch may seem daunting, but if you have a solid understanding of CMD, migrating your skill set over to the newer …

Hacking Android: How to Create a Lab for Android Penetration Testing

As Android bug bounty hunters and penetration testers, we need a properly configured environment to work in when testing exploits and looking for …

How To: Track Wi-Fi Devices & Connect to Them Using Probequest

Wi-Fi devices are continually emitting "probe frames," calling out for nearby Wi-Fi networks to connect to. Beyond being a privacy risk, probe frames …

Access The Files On Your Old Computers With This Adapter

9:13 PM 07/25/2018<p>Do you have old PCs and laptops lying around your house? You probably know you have semi-important files on those computers but are …

EasySSH is your next favorite GUI SSH client

EasySSH offers a convenient way to connect to your remote Linux servers. Even with a couple of caveats, it can make your admin life a bit easier. …

Exclusive: PwdPwn audits Active Directory DB with 5K passwords in 15-30 seconds

Created by Sydney developer Luke Millanta, the tool is intended for system administrators to conduct audits more regularly and enforce better …