Natasha BADGELEYMar 131 min readCollecting Incident Response DataIn Incident response data by collecting the state of the machine which includes the date, time, open ports, IP address configuration,...
Natasha BADGELEYMar 131 min readLaunching an AttackThe first step in a brute force attack is to plan the attack. After planning, the attacker can use scanning tools like nmap and zenmap to...
Natasha BADGELEYMar 131 min readBacking up the pfSense FirewallIn a modern IT department, a backup is a copy of data (files, databases, configurations, etc.) that is stored in a place so it can be...