Sunday, December 8, 2024

Dec 9, 2024

An internal network penetration test will include mapping the network, compromising vulnerable services, elevating user rights to administrators, and gathering evidence.

A pentest report includes how the network was breached, how the security controls were bypassed, and what the company can do to identify these gaps. It takes 40 hours to create this report.

(Pages 1-7).


The tool used on the laptop to breach the wireless access point is called. Once used against the jeremiahoneal wireless access point, it was determined that the password was XXXX

No comments:

Post a Comment

Enhancing My Job Search with a Custom Mesh Network

 To streamline and organize my job search efforts, I recently set up a mesh network connecting my laptop to a Raspberry Pi running Portainer...