Open Shortest Path First (OSPF) It is a link state routing protocol that was developed as an alternative for the distance vector Routing Information Protocol (RIP). RIP reliance on hop count as the...
Configuring Nessus to Perform Security Vulnerability Scans on Devices
What is Nessus Nessus is a security scanning tool which scans a computer and raises an alert if it discovers any vulnerabilities that malicious hackers could use to exploit or gain access to a s...
Setting up my own Recursive DNS Server using Pihole
Pihole Pihole is a forwarding DNS Server that you can host yourself that blocks network-wide ads when you attempt to visit web pages and open applications. Explanation If you type in the website k...
Password Cracking WPA2-PSK Networks
What Activities Ethical Hackers perform on Wireless Networks Evaluating strength of PSK Reviewing nearby networks, rogue devices Assessing guest networks Checking network access Tools us...
Getting saved WiFi SSID's and Passwords
Explanation This script will be able to output the WiFi names and passwords that the device has ever been connected to. Requirements In order for the script to run, the following are required: ...
Cube Dash - A Unity 2D minigame
PLAY HERE So I got to complete my own game consisting of 3 levels as I continue to learn about Game Development. I found game development to be very interesting since I grew up playing lots of ga...
Subnetting Cheatsheet
I compiled this Subnetting Cheatsheet for easy reference and reminder on how to subnet ip addresses. Formulars 2^h = number of hosts; where h is the number of host bits 2^h - 2 = number of usable...
- 1
- 1 / 1