Occasionally in my life I've helped out with various friends sites, and one of these was for a long time built upon a CMS called concrete5. To me, conrete5 is a fairly different CMS from various other offerings such as Drupal and Wordpress, with more of a drag 'n ...read more
There are quite a few really good Linux based attack platforms available:
But i was interested in a greater level of customization and flexibility in the tool set, system configurations and user configurations. I have started building up Ansible playbooks for the tools i wanted ...read more
In other posts i have talked about setting up WPA2 Enterprise wireless networks for the regular users of my network. However this setup is not convenient for the following example use cases because of increased overhead or lack of WPA2 Enterprise support:
- Guest users
- Non WPA2 Enterprise capable devices (PS3 ...
The problem with WPA2 Personal is that it uses a pre-shared key (PSK) for its authentication which is transmitted through the air as a hash. A few years ago having a really good pre-shared key and unique AP name might have been enough but with the availability of rainbow tables ...read more
Before I got too entrenched in configuring my shiny new MikroTik RB2011UiAS-2HnD I endeavored to lock it down a little more so I could take my time whilst having peace of mind.
When you power the router up for the first time, plug an Ethernet cable from your configuring computer ...read more
I got to a point where I wanted to give my home network a boost with more security in mind and from my research on SOHO equipment the MikroTik RB2011UiAS-2HnD was victorious for the following reasons.
- Required hardware specifications (No 5Ghz :( - there is always that one thing missing)
- Full featured ...
Page 1 / 1