Blog

Reconnaissance: SSH Attacks via CVE-2006-5229 & CVE-2016-6210

Major Boothroyd here again to tell you about the Kill Chain, starting at reconaissance.  In our last blog post we talked about looking at cyber attacks from a Kill Chain Model perspective and outlined the Kill Chain Phases.  The first phase is reconnaissance which we explained as vulnerability assessments.  First before we begin to assess... Read More »

What is hacking?

Major Boothroyd here for the first time to tell you about hacking.  The Major asked some acquaintances for topics to blog on and several stated an introductory about hacking.  First, hacking is the ability to reverse engineer, recreate, modify, or create computer programs via programming languages –this blog will have a heavy concentration on teaching... Read More »