Oscar Rodriguez

@OscarRodrig5sul | Keep up with Oscar Rodriguez on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Oscar Rodriguez”

How To: Automate Brute-Force Attacks for Nmap Scans

Using Hydra, Ncrack, and other brute-forcing tools to crack passwords for the first time can be frustrating and confusing. To ease into the process, …

Forensics

snallygaster – Scan For Secret Files On HTTP Servers

snallygaster is a Python-based tool that can help you to scan for secret files on HTTP servers, files that are accessible that shouldn’t be public …

Information Security

Back Up and Clone Your Hard Drive with Macrium Reflect

Our Windows App of the Week isn’t something you’ll probably have to use very often—we hope—but it’s a great tool if you’re upgrading your system and …

Linux

Robert Herjavec's Do's and Don'ts: From Cryptocurrency to Cyber Hygiene

'Shark Tank' star offers best practices to protect your business from hacks, leaks and the cost of cleaning up afterward.<p>Opinions expressed by <i>Entrepreneur</i> contributors are their own.<p>“There are no more excuses. We’re all aware of internet-based threats and have a responsibility to protect our …

Cybersecurity

How To: Use Leaked Password Databases to Create Brute-Force Wordlists

To name just a few companies, VK, µTorrent, and ClixSense all suffered major data breaches at some point in the past. The leaked password databases …

White Hat

How To: Create Custom Wordlists for Password Cracking Using the Mentalist

Beginners learning brute-forcing attacks against WPA handshakes are often let down by the limitations of default wordlists like RockYou based on …

White Hat

How To: Attack Web Applications with Burp Suite & SQL Injection

Web applications are becoming more and more popular, replacing traditional desktop programs at an accelerated rate. With all these new apps out on …

Information Security

A Twist On The Cyber Kill Chain: Defending Against A JavaScript Malware Attack

This slightly modified model is a practical way to keep attackers out of your systems.<p>Understanding how malware attacks work is vital to defend …

Cybersecurity

Flaw in Microsoft Outlook Lets Hackers Easily Steal Your Windows Password

A security researcher has disclosed details of an important vulnerability in Microsoft Outlook for which the company released an incomplete patch …

Information Security

This new router exploit is the motivation you need to switch to a mesh solution

Most everyone has a Wi-Fi router in their home and their workplace. Wi-Fi is everywhere and it's how most personal devices connect to the internet: a …

Wi-Fi

How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack

While Wi-Fi networks can be set up by smart IT people, that doesn't mean the users of the network are similarly tech-savvy. We'll demonstrate how an …

White Hat

Hacking Windows 10: How to Capture Keystrokes & Passwords Remotely

Using a keylogger to intercept keys pressed on an infected computer can circumvent encryption used by email and secure chat clients. The collected …

Cybersecurity

Perspectives: The Next Big Cybersecurity Threats Facing Businesses

It seems just about every day there’s a new report of a high-profile data breach that has affected a big corporation, government agency or political organization. As we collect more data, and as we add devices to the global network, the risk of attack and loss is growing exponentially. More is at …

Cybersecurity

Hacking Windows 10: How to Find Sensitive & 'Deleted' Files Remotely

Deleted bank statements and private photos are still within an attacker's grasp, so don't think that emptying your recycling bin is enough to keep …

Malware

Cloudflare makes it harder for ISPs to track your web history

If you're privacy-minded, you probably aren't thrilled that governments seem hell-bent on giving internet providers free rein over your browsing data. Cloudflare just gave you a tool to fight back, however. It launched 1.1.1.1, a free Domain Name System service (the technology that translates IP …

Privacy

Hacking Windows 10: How to Steal & Decrypt Passwords Stored in Chrome & Firefox Remotely

Passwords stored in web browsers like Google Chrome and Mozilla Firefox are a gold mine for hackers. An attacker with backdoor access to a …

Information Systems

Hacking Windows 10: How to Break into Somebody's Computer Without a Password (Exploiting the System)

After a hacker has configured Metasploit on a remote private server, created a resource script for automation, and created a simple payload, he or …

Cybersecurity

SSH Mastery: OpenSSH, PuTTY, Tunnels, and Keys

Overview<p>SSH Mastery: OpenSSH, PuTTY, Tunnels, and Keys by Michael W Lucas<p>“One of the best technical writers in the networking and security …

Linux

How to Pass a Drug Test If You’ve Smoked Marijuana.

(<b>ThyBlackMan.com</b>) If you are an occasional marijuana user but your job has sprung a drugs test on you, or you are applying for a new job in which you …

Cannabis

Azure WAF to protect your Web Application

<b>OVERVIEW</b><p>Azure WAF is part of Azure Application Gateway and provides centralized protection of your web applications from common exploits and …

How Why the Cybersecurity Landscape Is Changing

A comprehensive new report from Cisco should "scare the pants off" enterprise security leaders.<p>Cisco recently published its 2018 annual cybersecurity …

Cybersecurity

Joe Montana: Now is the Time for Marijuana Education

The four-time Super Bowl champ wants to spread awareness about pot's curing capabilities.<p>Four-time Super Bowl champion Joe Montana is now championing …

Cannabis

How To: Hack WPA & WPA2 Wi-Fi Passwords with a Pixie-Dust Attack Using Airgeddon

Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this …

Information Security

10 Terminal commands for power users

Apple's Terminal offers a lot of functionality compared to the macOS GUI. Power users and anyone else who wants to work smarter will benefit from …

Linux