Before starting this post I want to state this is not an ad or promotion or anything like that it is me who reached out the 0 Day for an interview as I am genuinely a fan of their clothes. There tops have appeared in my favourite show (and probably your favourite too) Mr Robot….
Tag: Cyber Security
HACKTORIA: The Killer Clown – Walkthrough
Back with another Hacktoria walkthrough, easing myself in by working through all the easy ones first and this time it is ‘The Killer Clown‘. Ok, so I won’t try to over think this like I did on the lost at see when i tried to crack the password using the RockYou.txt lol. So the image…
HACKTORIA: Lost at Sea – Walkthrough
Hello People, I have decided to do something a little different to my usual posts of interviews, book and course reviews and stuff like that to do some walkthroughs for both Hacktoria and Over the Wire. I started to do the OVW ages ago and got to busy to really put any time into it…
Learn Computer Forensics – Second Edition by William Oettinger for Packt REVIEW
Hello, I have had the absolute pleasure to be reading and working though this book ` Learn Computer Forensics: Your one-stop guide to searching, analysing, acquiring, and securing digital evidence, 2nd Edition`. “Computer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data…
[DFIR TOOLS] Timeline Explorer, what is it & how to use!
I am going to try something different for this post and the other I plan to do in this type of upcoming articles because I plan to speak about different tools in ‘Digital Forensics & Incident Response’ starting with all the tools by Eric Zimmerman and then moving on to others. Partly this is for…
Turning more of a focus onto DFIR (Digital Forensics & Incident Response) and Hacking here at The Security Noob!
Hello, So, as it says in the title I am going to be doing a ‘soft reboot’ of the website and making my blog more DFIR/Hacking specifically dedicated to that subjects and will try to explain here why and speak about some posts and interviews that I have planned. When it comes to most careers…
HACKING APIS (Breaking Web Application Programming Interfaces) by Corey J Ball for No Starch Press REVIEW
Have been reading through this beauty of a book from Corey Ball. Who is the Author Corey Ball? “Corey Ball is a cybersecurity consulting manager at Moss Adams, where he leads penetration testing services. He has over 10 years of experience working in IT and cybersecurity across several industries, including aerospace, agribusiness, energy, fintech, government…
Week Nine of EC-Council Certified Incident Handler (ECIH) Version 2 Self-Study Training
Hey guys, If you haven’t read the previous articles here they are:- Week One Week Two Week Three Week Four Week Five Week Six Week Seven Week Eight So, moving onto module 7 and seeing as we are covering web application security it will come as no surprise that this is the BIGGEST module of…
Interview with Security Researcher, Speaker Will Thomas (@BushidoToken)
Welcome back to another interview and thanks as always for popping in. I had the chance to speak to someone I really like and rate highly and is one of the really good guys, I am lucky to interview loads of great people and have yet to come across anyone that I haven’t really got…
Week Eight of EC-Council Certified Incident Handler (ECIH) Version 2 Self-Study Training
Hey guys, If you haven’t read the previous articles here they are:- Week One Week Two Week Three Week Four Week Five Week Six Week Seven So, moving onto module 6. Introduction to Network Security Incident Common Network Security Incidents Need for Network Security Incident Handling and Response Preparation for Handling Network Security Incidents Preparation…