Now showing items 1-10 of 10

    • Capture the Flag (CTF): Website Tutorial to Boost Cybersecurity Training 

      Santiago Lozada, Reinaldo E. (Polytechnic University of Puerto Rico, 2019)
      Cybersecurity is a new topic in many organizations, including educational organizations. This new field will have an increase, as new technologies emerged. For that reasons, in order to meet the cybersecurity personnel ...
    • Hacking Mobile Devices Using WiFi Pineapple Nano 

      Mojica Serrano, Alexis (Polytechnic University of Puerto Rico, 2019)
      Nowadays wireless access points can be found everywhere from fast food restaurants to private companies embracing Bring Your Own Device (BYOD) policies. These access points present a flexible solution in which different ...
    • Implementing USB Attacks with Microcontrollers 

      Rodríguez Ocasio, Alejandro (Polytechnic University of Puerto Rico, 2019)
      The USB specification has become one of the most prominent standards for interconnection between devices and peripherals. Its main objective is to provide ease of use and increase compatibility by implementing standard ...
    • Informative Overview of Rainbow Hashes 

      Hornedo Martínez, Víctor (Polytechnic University of Puerto Rico, 2022)
      This article gives an overview for rainbow tables and the results of testing rainbow tables according to the length of the chosen chain. The article presents a password cracking process that contains its own ...
    • Offensive Security Using Burp Suite 

      Torres, José (Polytechnic University of Puerto Rico, 2020)
      Burp Suite is a tool used by most professional web page pen tester. It has many features to help the pen tester do his job. The tool help students learn about different type of vulnerabilities like web cache poisoning, ...
    • An Overview to BackTrack Penetrations Tools 

      Grau Ortiz, Keiny J. (Polytechnic University of Puerto Rico, 2012)
      Abstract - This paper is in support of a newly created tutorial, focused on different penetration and vulnerabilities tools. These tutorials are specifically designed to provide basic understanding on the functionalities ...
    • Preparation and Delivery of Material for Special Topics in Information Assurance Courses at an Undergraduate and Graduate level 

      Bennett, Steven D. (Polytechnic University of Puerto Rico, 2018)
      I produced coursework for the undergraduate course Penetration Testing and the graduate course Reverse Engineering. The Spring 2017 trimester was the first time that either of the courses had been given. This presented a ...
    • Tutorials of how to use Metasploit, Nessus and Nmap 

      Adames Méndez, Obed A. (Polytechnic University of Puerto Rico, 2012)
      Abstract - This paper is in support of three newly created tutorials, focused on different Security and Penetration testing tools. The tutorials have been selected to cover three different areas in the security and penetration ...
    • Uso de las Técnicas Del Hacking Ético para la Reducción de Amenazas de Ciberseguridad 

      González González, José M. (Polytechnic University of Puerto Rico, 2023)
      A medida que las empresas tanto públicas como privadas comienzan a acomodar gran parte de sus capacidades de sistemas de información en la Internet, se hacen más propensas a que hackers de índole criminal puedan utilizar ...
    • ZAP Proxy and OWASP Top 10 

      Ramos Flores, Eduard (Polytechnic University of Puerto Rico, 2023)
      The Zed Attack Proxy is a well-known and popular assessment tool in the cybersecurity community. The Open Web Application Security Project community offers, develops, and maintains the Zed Attack Proxy. The Open Web ...