Tuesday, September 23, 2014

Tech Tip Tuesday - Kali NetHunter

If you have a Google Nexus device laying around and you wanted to load Kali Linux on it, well you're in luck. Offensive Security has released NetHunter that can be installed on your Nexus devices to use as a portable penetration testing device.


If you have a Tech Tip you want to share, send them to info@cyberhui.org and we'll get them out next #TechTipTuesday.

Wednesday, September 17, 2014

Tech Tip Tuesday – Netcat

It’s known as the Swiss army knife because it can do almost anything. Port scanning, banner grabbing, DNS forward/reverse checking, transferring files, and making Julienne fries. Well maybe not the fries. The good people at the SANS Institute put together this cheat sheet to help you get started.

If you have a Tech Tip you want to share, send them to info@cyberhui.org and we'll get them out next #TechTipTuesday.

Tuesday, September 9, 2014

Tech Tip Tuesday - iPhone wiping

Whether you're planning on selling your old iPhone on Craigslist or just trading it in for an upgrade to the new iPhone 6 or 6 Plus, make sure you remove all your personal information. Apple has a couple of ways for you to do this. It will keep your Backstreet Boys playlist between you and your earphones.


If you have a Tech Tip you want to share, send them to info@cyberhui.org and we'll get them out next #TechTipTuesday.

Monday, September 8, 2014

Cyber Hui CyberPatriot VII Self Assessment Survey

Last year I utilized a self-assessment survey for Leilehua. This helped me gauge the student's knowledge and skill level prior to starting my training regime with them.

Our goal was to find and develop subject matter experts for each core area: Windows, Linux, and Networking. We put together 2-person teams for each of the core areas.  We leveraged the results of the survey to help form the teams.

Additionally, the survey helped me get contact info for the students.  As a mentor, the ability to communicate and share information with the students is vital.  My main form of communication outside of the classroom was email.

I also used the survey as a post self-assessment to gauge the how much the students felt they learned from the competition and the training I provided.  This has led me to shift my training plan for this year.

I placed the survey online and made it available to any coaches or mentors that would like to use it. If you decide to use it,

1. Email info@cyberhui.org with your school name and contact info
2. Give your students this url (http://bit.ly/CPVIISA)
3. I will send you the results of what they submitted.

Wednesday, September 3, 2014

Tech Tip Tuesday – Two Factor Authentication (2FA)

Are you worried about your personal information from your Apple iCloud or Dropbox getting in the wrong hands? Trail of Bits put together a walkthrough to setup 2FA on those services. What is 2FA? Two-factor or multi-factor authentication uses a combination of these three things. 1. Something you know (password, PIN) 2. Something you have (smart card, phone) 3. Something you are (fingerprint, retina). 2FA will protect you from password guessing and brute force attacks.

If you have a Tech Tip you want to share, send them to info@cyberhui.org and we'll get them out next #TechTipTuesday.

Monday, September 1, 2014

SANS Cyber Aces Online is Open

As of today, the SANS Cyber Aces Online is open. 

Cyber Aces provides free and online, selected courses from the professional development curriculum offered by the SANS Institute, the global leader in cyber security training. 

You have two options to participate in the Cyber Aces program. 

1. With quizzes, which will test your skills every 3 months

2. Without quizzes, where you can access the course material at your own leisure. 

The training offered by Cyber Aces can also benefit students participating in the CyberPatriot program and is highly recommended. 

Top performers in the online course quizzes (option 1 above) will be invited to attend the National Cybersecurity Career Fair (NCCF), the largest virtual career fair in the cybersecurity industry. The 2014 NCCF featured18 leading employers in the information security industry, including the NSA, the US Army’s Intelligence and Security Command (INSCOM), Citi, JP Morgan Chase, CBS, NBC Universal, Accenture, KPMG, Pricewaterhouse Coopers (PwC), Ernst & Young, Juniper Networks, Solutionary, Palantir, Stroz Friedberg, FINRA, Branch Banking & Trust Co., NIPSCO, and STIGroup.

More information on Cyber Aces: http://www.cyberaces.org

Link to the Tutorials:

Thanks to Dillon for letting us know about the updated training.