Hello, welcome back if you are reading along, here is the next walkthrough. Level Goal The password for the next level is stored in a file called spaces in this filename located in the home directory Commands you may need to solve this level ls, cd, cat, file, du, find As usual, I will run…
CTF: Bandit Level 1 > 2 Walkthrough
Here we go again with another of the early levels at ‘Over the Wire’, it says for this one. “Level Goal The password for the next level is stored in a file called – located in the home directory Commands you may need to solve this level ls, cd, cat, file, du, find” As usual,…
CTF: Bandit Level 0 > 1 Walkthrough
Technically the first level after SSH into the server, we now need to start finding flags. Level Goal The password for the next level is stored in a file called readme located in the home directory. Use this password to log into bandit1 using SSH. Whenever you find a password for a level, use SSH…
CTF: Bandit Level 0 Walkthrough
These first few posts on the CTF challenges at ‘Over the Wire’ will be pretty short and basic which I am ok with, the whole purpose of ‘Over the Wire’ is to go from being an absolute beginner with ‘Bandit0 to Bandit34’ through to the others like Narnia and Maze. Suggested order to play the…
Interview With Cybercrime Expert and OSINT Specialist Under the Breach (you’ve probably seen them in the news).
As mentioned in previous articles I am absolutely fascinated with ‘OSINT’ (Open-Source Intelligence) and ‘Information Gathering’ when it comes to ethical hacking and cybersecurity, maybe I am some kind of voyeur who likes snooping but I suppose it’s always been there as I love people watching when travelling, I used to travel a lot in…
The Complete Cyber Security Course! Volume 2 by Nathan House (Review)
This is the second volume of the four-volume course and if you haven’t already you can read my review of volume 1 over here (https://thesecuritynoob.com/course/the-complete-cyber-security-course-volume-1-by-nathan-house-review/). VOLUME 1: HACKER’S EXPOSED VOLUME 2: NETWORK SECURITY VOLUME 3: ANONYMOUS BROWSING VOLUME 4: ENDPOINT PROTECTION I have a huge interest in networking so I was looking forward to getting…
About Parrot OS and Interview with its Founder Lorenzo “Palinuro” Faletra
When I started to do courses and work through books it was always Kali this Kali that which is fair enough as it is the most widely used security OS in the Cybersecurity/Pentesting world. After a while, I saw Hackersploit using the Parrot OS which piqued my interest and from there I set about finding…
The Complete Cyber Security Course! Volume 1 by Nathan House (Review)
Apologies for the long absence I have been not well most of January but back now and right into it. Since I started this site I have managed to discover some fantastic resources and this course were available on UDEMY at this link HERE, I have it through Station X. I will admit that I…
Interview with Founder/CTO of HackerSploit, Hacking Trainer and Professional Pentester Alexis Ahmed.
When I was first starting this site I looked around a few different training courses, tried a few and was not really impressed with any until I took ‘The Complete Ethical Hacking Masterclass Beginner To Expert’ Course by HackerSploit. As you can see by my review it was the PERFECT course at the time for…
‘Getting Started Becoming a Cyber Warrior’ by Occupy the Web (Review)
This is a book I was itching to get my hands on as you would already know if you read my review of ‘Linux Basics for Hackers’ and I can tell you it did not disappoint. Quite frankly the most enthralling tutorial-style book I have ever read of any kind in my 41 years in…