Professor Messer

Vulnerabilities and Exploits – CompTIA Network+ N10-007 – 4.4

In network security, we use specific terms to help describe security status and events. In this video, you’ll learn the differences between a vulnerability and an exploit. << Previous Video: Man-in-the-Middle Next: Device Hardening >> The term “vulnerability” and the term “exploit” are sometimes incorrectly used interchangeably. In this video, we’ll look at the differences […]

Vulnerabilities and Exploits – CompTIA Network+ N10-007 – 4.4 Read More »

Man-in-the-Middle – CompTIA Network+ N10-007 – 4.4

A man-in-the-middle attack can allow an attacker to view all of the network information sent and received by your workstation. In this video, you’ll learn about man-in-the-middle attacks, ARP poisoning, and man-in-the-browser attacks. << Previous Video: VLAN Hopping Next: Vulnerabilities and Exploits >> We usually consider our network communication to be private. We’re communicating to

Man-in-the-Middle – CompTIA Network+ N10-007 – 4.4 Read More »

Brute Force Attacks – CompTIA Network+ N10-007 – 4.4

If an attacker doesn’t know your password, they can try every possible combination in a brute force attack. In this video, you’ll learn about brute force and dictionary attacks. << Previous Video: Wireless Deauthentication Next: VLAN Hopping >> If you are trying to reverse engineer someone’s password, one of the best ways to do this

Brute Force Attacks – CompTIA Network+ N10-007 – 4.4 Read More »

Wireless Deauthentication – CompTIA Network+ N10-007 – 4.4

Wireless deauthentication or wireless disassociation can be used as a denial of service attack on wireless network devices. In this video, you’ll learn about wireless deauthentication, and I’ll demonstrate a deauthentication attack on my wireless network. << Previous Video: Spoofing Next: Brute Force Attacks >> A wireless disassociation attack is a bad one. You’re wandering

Wireless Deauthentication – CompTIA Network+ N10-007 – 4.4 Read More »