Your cart is currently empty!
Category: Phoenix BlackOps Blog
Phoenix Data CS Risk Framework
Phoenix Data CS Risk Framework Phoenix Data CS Risk Framework August 14, 2024 This post outlines the Phoenix Data CS Risk Framework (current version Beta 1.2).ย It addresses data assessment, data classification, and data scoring against the CIA Triad to determine data risk. The aim of the project is to provide a streamlined framework for…
-
ICMP Flood DoS Attack Explained
ICMP Flood DoS Attack Explained ICMP Flood DoS Attack Explained August 6, 2024 What is an ICMP Flood DoS Attack? ICMP stands for Internet Control Message Protocol and serves as a means to troubleshoot network issues, network diagnostics, and so forth. When one computer sends an ICMP echo-request to another computer, the receiving computer responds…
SYN Flood DoS Attack Explained
SYN Flood DoS Attack Explained SYN Flood DoS Attack Explained August 6, 2024 What is a SYN Flood DoS Attack? When two devices first create a TCP connection via the TCP three way handshake, the client machine sends what is called a SYN request to the server. The server then responds with a SYN/ACK and…
Exploring a WordFence Activity Report
Exploring a WordFence Activity Report Exploring a WordFence Activity Report August 5, 2024 WordFence is a well known security solution for WordPress websites. It is packed with security features including the wordfence web application firewall, website hardening capabilities, monitoring, logging, bruteforce prevention, 2FA etc. One of its features is its ability to send weekly and…
Intro to Nmap
Intro to Nmap Intro to Nmap July 17, 2024 Nmap (or Network Mapper) is a tool that aids in scanning devices on a network. A hacker favorite as well as an essential in network administration, Nmap can discover devices on a network, discover open ports on devices, discover the OS and software devices are running…
NMAP –Help V7.80
NMAP –Help NMAP –Help July 16, 2024 This is just a copy of nmap –help Copy to clipboard # Run nmap –help to display this help page in the terminal Nmap 7.80 ( https://nmap.org ) Usage: nmap [Scan Type(s)] [Options] {target specification} TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc. Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1;…
-
Taping Cams for Security?
It comes down to privacy, cams connected to the internet, if hacked could be used to spy on victims.
Setup 2FA on an SSH Server with Recovery in Mind
Setup 2FA on an SSH Server with Recovery in Mind Setup 2FA on an SSH Server with Recovery in Mind June 29, 2024 When you’ve enabled time based 2FA authentication on a remote ssh server, have you ever wondered what you might do if you lost your phone? What about if your server lost track…
Why You Might Not Want to Enable Time-Based 2FA on a SSH Server
Why You Might Not Want to Enable Time Based 2FA on a Remote SSH Server Why You Might Not Want to Enable Time Based 2FA on a Remote SSH Server June 29, 2024 This might seem against best principles in server management and protection, but if you’ve ever had a server’s time go hay-wire or…
Encrypt Files with OpenSSL in Linux
Encrypt Files with OpenSSL in Linux Encrypt Files with OpenSSL in Linux June 28, 2024 Do you need to send a sensitive or secret email through Gmail or another email provider? Or have you ever needed to keep sensitive company info on a personal computer while traveling? If so you should encrypt these files so…