Blog

  • Published Date
    Modified Date

    MD5 Password Cracking with John the Ripper

    In this article, I will demonstrate the cracking of MD5 salted passwords using Kali Linux and a password cracking tool, John the Ripper. To put this into context, some older… Read more

  • Published Date
    Modified Date

    Three Mobile Telephone Call Scam Exposed

    Change Log Date Change 23/04/2024 Added an update to include a response from the telephony provider. Today, I have managed to expose another scam targeting people throughout the United Kingdom.… Read more

  • Published Date
    Modified Date

    Why I Turned Down a £300,000 Job Opportunity

    In the ever-evolving landscape of employment, opportunities often come knocking at our door when we least expect them. Recently, I found myself faced with a tempting opportunity that landed in… Read more

  • Published Date
    Modified Date

    O2 Discount Offer Vishing Scam Exposed

    Change Log Update Date Updates on the outcome of reporting this scam. 05/04/2024 Added a copy of my email sent to Nextec UK Limited 09/04/2024 Coming in hot with another… Read more

  • Published Date
    Modified Date

    Cisco Firewall Migration Paths

    Update Date Added additional migration options for some of the announced EoL devices. 27/03/2024 Added additional migration options for organisations that want to skip the 2100 series. 27/03/2024 Change Log… Read more

  • Published Date
    Modified Date

    Graylog vs Wazuh Syslog Output Observations

    Recently I’ve been working with Wazuh to forward syslog from network devices using Rsyslog. Usually, I would send syslog to a dedicated SIEM but I wanted to test the out-of-the-box… Read more

  • Published Date
    Modified Date

    Configure Rsyslog for Logging to Wazuh

    In this article, we will take a look at how to configure a Linux server with Rsyslog so that we can receive syslog events from network devices before sending them… Read more

  • Published Date
    Modified Date

    Talk to the Dead with AI

    The use of Artificial Intelligence (AI) has greatly increased in the past year and is expected to keep growing. AI is being used for various things like chatbots and creating… Read more

  • Published Date
    Modified Date

    How to Capture the DNS Query Count from a Windows Server

    In this article we will take a look at how to capture the number of DNS queries that a Windows server receives. Prerequisites Steps To get the best results, I… Read more

  • Published Date
    Modified Date

    How to Determine the Number of Cisco Umbrella Seats Required

    Change Log Change Date Added a new section ‘Calculating SIG Usage’ 18/03/24 One thing that I find is often overlooked, misunderstood or not really understood from the very start is… Read more

Follow me

Popular Tags

#LabEveryday 2FA asa asav Azure ccie ccie security CCNA ccna security CCNP CCNP Security Cisco cisco asa Cisco Duo cisco firepower Cisco Identity Services Engine Cisco ISE Cisco Labs Cisco Secure cisco umbrella CISSP Cyber Security Cybersecurity Duo Duo MFA Duo Security Duo Single Sign-on Duo SSO FirePOWER FMC FTD Identity Services Engine ISC2 ISE Labs microsoft Network Security network wiizkiids network wizkid phishing PKI Security security vmware VPN

Stay updated with our latest articles by joining our newsletter.

0
YOUR CART
  • No products in the cart.