Hey guys, For this post I am giving you something different, not an interview or review but a COMIC BOOK!!! If you follow me on twitter you will be aware that I also make comic books in my spare time as a writer and letterer. Well I got a chance to merge two of my…

The Complete Cyber Security Course! Volume 4: End Point Protection by Nathan House (Review)
First of all, I have to apologise for the lack of posts the previous few months. After being put on furlough in April I was made redundant in July so when I wasn’t home-schooling the kids with the wife I was searching for jobs bit I am pleased to say I HAVE ONE and started…

Interview with award-winning Security Blogger, Researcher, Podcaster and Public Speaker Graham Cluley
Apologies for the lack of posts of late was really busy working from home and the with all this Corona/COVID 19 stuff I have been made furloughed so have been at home for the last week helping the wife home school. All the rubbish aside I am super excited to bring you this interview I…

PowerShell for Hackers (W41) by Atul Tiwari for Hakin9 (Review)
Hey guys, Back with another review on a course, I have just finished it and as you can see from the title it’s a course using PowerShell for hacking so something totally different to what I have been doing with Linux, Kali, Parrot and suck so far. The concept of using windows for hacking is…

The Complete Cyber Security Course! Volume 3 by Nathan House (Review)
This is the Third volume of the four-volume course and if you haven’t already you can read my review of volume 1 and 2 over here:- VOLUME 1: HACKER’S EXPOSED VOLUME 2: NETWORK SECURITY VOLUME 3: ANONYMOUS BROWSING VOLUME 4: ENDPOINT PROTECTION I have to start by saying how much I am enjoying these courses…

Interview with Cybersecurity Expert and Writer Daniel Miessler
Today I am posting an interview I have done with cybersecurity expert speaker, podcaster, author and author Daniel Miessler and I am super happy I got the chance to speak with him. He has probably one of the most viewed blog posts out there on starting in cybersecurity and certainly one that I was pointed…

CTF: Bandit Level 2 > 3 Walkthrough
Hello, welcome back if you are reading along, here is the next walkthrough. Level Goal The password for the next level is stored in a file called spaces in this filename located in the home directory Commands you may need to solve this level ls, cd, cat, file, du, find As usual, I will run…

CTF: Bandit Level 1 > 2 Walkthrough
Here we go again with another of the early levels at ‘Over the Wire’, it says for this one. “Level Goal The password for the next level is stored in a file called – located in the home directory Commands you may need to solve this level ls, cd, cat, file, du, find” As usual,…

CTF: Bandit Level 0 > 1 Walkthrough
Technically the first level after SSH into the server, we now need to start finding flags. Level Goal The password for the next level is stored in a file called readme located in the home directory. Use this password to log into bandit1 using SSH. Whenever you find a password for a level, use SSH…

CTF: Bandit Level 0 Walkthrough
These first few posts on the CTF challenges at ‘Over the Wire’ will be pretty short and basic which I am ok with, the whole purpose of ‘Over the Wire’ is to go from being an absolute beginner with ‘Bandit0 to Bandit34’ through to the others like Narnia and Maze. Suggested order to play the…