• Home
The Security Ninja
General infosec ramblings for the SMB IT Pro
Menu Close
  • Home

Blue Team

Using NMAP and Slack for Notification of Network Changes

January 25, 2019[email protected]

Slack is becoming a more common collaboration in the workplace, not to mention it’s pretty much the “gold standard” for various tech-based community chat rooms.  Because Slack has a built-in notification system I though that it would be interesting to… Continue Reading →

Blue Team, Network, Projects Blue Team, NMAP, Notifications, Scanner, Slack

End User Training – Reminder

November 15, 2018[email protected]

It has become common knowledge (or I at least I hope that it has), that we need to take the time from our overflowing work day to train the end user entrusted to our care about the danger of phishing… Continue Reading →

Blue Team, Spam best practices, Blue Team, Email, End Users, O365, password, SPAM, Training

Are you covering your assets?

March 22, 2018[email protected]

Does your company have internal assets exposed to the internet? There is a very good chance that you do.  Many companies have exposed some of their internal assets to the world both intentionally and unintentionally.  For instance, if you run… Continue Reading →

Blue Team, Recon Blue Team, security

Have you been pwned?

February 11, 2018[email protected]

In this digital age data breaches have sadly become and everyday occurrence. Well, technically they have become a multiple time a day occurrence. In fact, by September of 2017 there were over 1000 publicly disclosed data breaches (http://breachlevelindex.com/data-breach-database) alone in… Continue Reading →

Blue Team, Recon Blue Team, data breach, password, Recon

Proper WHOIS Use

January 9, 2018[email protected]

I’m fairly confident that most of you reading this post are familiar with what WHOIS is, but just in case you are not, it is defined on Wikipedia as follows: “WHOIS (pronounced as the phrase who is) is a query and response protocol that… Continue Reading →

Blue Team, Recon best practices, Blue Team, Privacy, Recon, security, WHOIS

Wireless Insecurity – Reasons for Security

December 5, 2017[email protected]

Ok, so I kind of jump the gun on this series and went straight into both red team (attacking) and blue team (defenses) without even mentioning why we need wireless security in the first place. Sure, for most of us… Continue Reading →

Blue Team, Wireless

Wireless Insecurity – WPA2 Successor?

November 15, 2017[email protected]

Last week I had the privilege to be a guest on the Defrag This podcast to speak about wireless security which you can listen to here: https://blog.ipswitch.com/wireless-security-protocols-brad-call. During the interview I was asked if there was a replacement to WPA2… Continue Reading →

Blue Team, Wireless Wi-Fi, Wireless, WPA

Recent Posts

  • C2 Server Setup on a Raspberry Pi
  • Taking the OSWP exam in 2019
  • Changing Windows AM/PM Prank with a USB Rubber Ducky
  • Are Secured Hotspots Safe?
  • Using NMAP and Slack for Notification of Network Changes

Archives

  • September 2019
  • July 2019
  • June 2019
  • May 2019
  • January 2019
  • November 2018
  • July 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017

Categories

  • Blue Team
  • Hacking
  • Hak5
  • Network
  • PowerShell
  • Projects
  • RaspberryPi
  • Recon
  • Red Team
  • Spam
  • Uncategorized
  • Windows
  • Wireless

Recent Comments

    © 2022 The Security Ninja. All rights reserved.
    Fashionista by aThemes
     

    Loading Comments...