Featured Project

Practical Exploitation and Security Testing with Metasploit

Cybersecurity
Networking
Kali-LinuxMetasploit

This project demonstrates the use of Metasploit to perform practical security testing in a controlled lab environment. It covers identifying vulnerable services, selecting appropriate exploit modules, and validating system weaknesses through controlled exploitation to understand potential security impacts.

1 month ago
1 min read
View Project
Practical Exploitation and Security Testing with Metasploit
Practical Exploitation and Security Testing with Metasploit

Practical Exploitation and Security Testing with Metasploit

Cybersecurity
Networking
Kali-LinuxMetasploit

This project demonstrates the use of Metasploit to perform practical security testing in a controlled lab environment. It covers identifying vulnerable services, selecting appropriate exploit modules, and validating system weaknesses through controlled exploitation to understand potential security impacts.

1 month ago
1 min read
Implementing Enterprise Vulnerability Management with Rapid7 InsightVM

Implementing Enterprise Vulnerability Management with Rapid7 InsightVM

Cybersecurity
Networking
VMwareWindowsUbuntu

This project demonstrates the setup and configuration of Rapid7 InsightVM for enterprise vulnerability scanning. It covers platform deployment, asset discovery, scan configuration, and credential validation to enable effective vulnerability identification across systems and infrastructure.

1 month ago
1 min read
How I Learned and Used Ansible for Automation

How I Learned and Used Ansible for Automation

Networking
DockerProxmoxUbuntuAnsibledebianAlpine-Linux

Automating server updates with Ansible simplifies multi-server maintenance. This post covers my learning process, setup, and a practical playbook.

1 year ago
2 mins read
Mastering OWASP Juice Shop: Exploiting & Securing OWASP Top 10

Mastering OWASP Juice Shop: Exploiting & Securing OWASP Top 10

Cybersecurity
NginxAngular Cloudflare Zero TrustBurpsuiteKali-LinuxUbuntu

A deep dive into OWASP Juice Shop, exploring key vulnerabilities from the OWASP Top 10, their impact, and best practices for securing web applications.

1 year ago
5 mins read
Open Redirect and Reverse Tabnabing PoC

Open Redirect and Reverse Tabnabing PoC

Cybersecurity
Nginxdebian

This security assessment of robertquintero.me identified Open Redirect and Reverse Tabnabbing vulnerabilities, both confirmed as high-risk threats. These flaws allow attackers to manipulate user navigation, enabling phishing attacks and potential session hijacking. Immediate remediation is advised, including URL validation, rel="noopener noreferrer" attributes, and enforcing security headers to mitigate risks.

1 year ago
2 mins read
OpenVAS: Setting Up Your First Vulnerability Scan

OpenVAS: Setting Up Your First Vulnerability Scan

Cybersecurity
ProxmoxUbuntuOpenVasCloudflare Zero TrustKali-Linux

Discover the power of OpenVAS, a free and open-source vulnerability scanner that helps you identify security weaknesses in your network and applications. This blog post provides a comprehensive guide to getting started with OpenVAS, from installation and configuration to running your first scan and interpreting the results

1 year ago
4 mins read