Hi, I'm Wayne!
USMC/ Army Reserves Veteran, Freelance Writer, and Cybersecurity Professional
-Vulnerability Management
-
Keylogger -https://github.com/NSPSecuritySolutions/Key-Logger-Tutorial-
-
Building A Packet Sniffer
Python https://www.youtube.com/watch?v=WGJC5vT5YJo
Windows Privilege Escalation and Keyboard Sniffing with Metasploit and Powershell youtube.com/watch?v=BAndD6a4wA0
Creating a sinkhole How to Create a Sinkhole DNS Policy on the FMC https://www.youtube.com/watch?v=QClnyP7Shs0
Sinkhole Config How to Configure DNS Sinkhole | What is DNS sinkhole| Concept| LAB | DAY 44 | https://www.youtube.com/watch?v=aF5Vn3aQywU
creating a honey pot 2 What is a honeypot, How to install and what can we see from honeypots? https://www.youtube.com/watch?v=0WUaI2pNiPI
honeypot 2 Cyber Security Projects - Honeypot (watch hackers FAIL...it's AWESOME!!) https://www.youtube.com/watch?v=r9b6H2N9eDE&t=25s
-
nMap recon
-
Practice with nMap Nmap Tutorial to find Network Vulnerabilities https://www.youtube.com/watch?v=4t4kBkMsDbQ Use Nmap for Tactical Network Reconnaissance [Tutorial] https://www.youtube.com/watch?v=ltEFbi_I2KY
zenmap device discovery https://www.youtube.com/watch?v=wt_xMols4Ww
-
-
QualysGuard
-
Data Loss Retrieval
-
SQL Injection
-
Security Assessment Report on an Existing Websites
-
Create a Cybersecurity Policy from Scratch
-
Scanning Strategies and Best Practices
-
Reporting Strategies and Best Practices
nMap
Qualys
Snort
Splunk
WireShark
Wazuh
osForensic
SpyBot
Spiderfoot
Avast Sophos Malwarebytes
Active Directory home lab with powershell
- [Example] (