摘要:
Wireshark for Ethical Hackers - 3 Blue Team - Defender View nmap Attacker IP: 192.168.1.17 Defender IP: 192.168.1.15 Case 1: Run following syn attack 阅读全文
摘要:
Wireshark for Ethical Hackers - 2 Interface Overview Start Wireshark in Kali Linux. HTTP Image Extracting filter: image-jfif Show packet bytes / Expor 阅读全文
摘要:
Wireshark for Ethical Hackers - 1 Outline Prereq Interface Overview HTTP Passwords Blue Team Wireless Prerequisites OSI Model 7 Layers of the OSI Mode 阅读全文
摘要:
PowerShell - Deep Dive Function # Creating Simple Function Write-Host "I have Dell Laptops with Windows OS" Function Global:Get-MachineInfo { Write-Ho 阅读全文
摘要:
PowerShell - Error Handling Understanding Error Variable in detail to use it efficiently $error.GetType() $error[0] Test $error[0].Exception.GetType() 阅读全文
摘要:
PowerShell - Loops If Statement # If statement with Zero else Statement $Number = 16 if ($Number -gt 10) { Write-Host "The value $Number is gerater th 阅读全文
摘要:
PowerShell - Hashtable #### Hashtable #array $numbers = 1..9 $numbers $numbers[4] #Hashtable #1st Approach $HT = @{} #2nd Approach $HT = @{ Tony = 30 阅读全文
摘要:
PowerShell - Arrays How to declare or create and operate an Array # Creating Array using Array Operator $fruits = @("Apple","Orange","KiWi") $fruits $ 阅读全文
摘要:
PowerShell - Pipelines Pipeline A series of commands connected by pipeline operators (|) Output of Preceding command becomes input of next command Obj 阅读全文
摘要:
PowerShell - Operators # arithmetic operators (+, -, *, /, %) [int] $1stnumber = Read-host "Enter 1st number " [int] $2ndnumber = Read-host "Enter 2nd 阅读全文