Fortify and Enhance Security Knowledge and Skills

About

Thanks for checking out my personal site and blog created using Jekyll. I’m using this site to keep current with best security practices in the industry, as well as practice vulnerability deployment on various vulnerable images primarily taken from the site VulnHub. I recently graduated from the Unviersity of New Hampshire where I received my Bachelor in Information Technology and Bachelor in Justice Studies. Please feel free to reach out with any comments related to the site.

Blog

15 Feb 2016 . spoofing . Spoofing Your Mac Address

This post will address the different methods you can take to bypass wifi-time restrictions commonly found in coffee shops, airports, xfinity hotspots, etc. This post will cover the methods most commonly used for Windows OS (XP,Vista,7,and 10), Linux (too many distros to list), and OSX (Lion, Mavericks, Yosemite, etc.). Below are some pictures of what typical wifi-time restrictions look like: Any hotspots commonly named “xfinitywifi” (saying commonly because hotspots could be spoofed, so be weary), are most likely owned by the ISP Comcast. They’ve been generous enough to offer a complimentary hour of free internet by just providing an email address (you don’t need to validate so come up with any random one) and a zip code (again could be any valid one)….

View more posts

Contact

Send me an email if you would like to get in touch or check out my other social media profiles. Thanks for checking the site out!

cbsedgley27@gmail.com