Kevin Pagano is a seasoned cybersecurity professional specializing in Digital Forensics and Incident Response. With a strong technical background and a passion for unravelling complex cyber incidents, Kevin has become a trusted expert in investigating and mitigating cyber threats. When i first started getting into DFIR and was searching for all blogs and tools to…
Tag: Ethical Hacking
Dead Simple Python Idiomatic Python for the Impatient Programmer by Jason C. McDonald (REVIEW)
“Dead Simple Python: Idiomatic Python for the Impatient Programmer” by Jason C. McDonald is a gem in the realm of Python programming literature, offering a refreshing and concise approach to mastering the language for both novice and seasoned developers alike. In a landscape often cluttered with verbose technical manuals, McDonald’s book stands out for its…
Interview with Hacker, Programmer and Former Armoured Recon Patrol Commander Leigh Trinity
Today, I have the privilege of sitting down with a remarkable individual who I have been friends with for a while now, a former armored recon patrol commander, she has traded the battlefield for the digital frontier, wielding her skills in C# and Python to fortify systems against potential threats. But that’s not all—beyond the…
Cybersecurity, Threats, Malware Trends & Strategies by Tim Rains 2nd Edition REVIEW
In the ever-changing landscape of cyber threats, malware, and data protection, Tim Rains’ book Cybersecurity, Threats, Malware Trends & Strategies provides an invaluable look into the current and future state of cyber security. With a wealth of knowledge and insights garnered from his time as a director at Microsoft’s Cybersecurity Solutions Group, Rains is able…
Practical Linux Forensics, A Guide for Digital Investigators by Bruce Nikkel for No Starch Press REVIEW
This book is a comprehensive and informative guide for those interested in digital forensics and investigations. The book covers a wide range of topics related to forensic analysis of Linux systems, including data acquisition, evidence preservation, and various forensic techniques. It is a fantastic read, even before going deep into it forensically, the digital and…
Cybersecurity-Attacks and Defenses Strategies 3rd Edition by Yuri Diogenes & Dr Erdal Ozkaya REVIEW
This book is a little different to the ones I have been reading recently in that it is more general in a sense that it covers the whole cybersecurity umbrella regarding red and blue teaming and the like. It’s nice every now and then to just read book like this every now and then over…
Network Basics for Hackers by Occupy the Web REVIEW!
Today I get to review another book from Occupy the Web who I am a big fan of, his books are fantastic, and I have every one that has been released so far, so when this book `Networking for Hackers` was getting released it was a total no brainer in working through it. It couldn’t…
Interview With One of the Great DFIR Talents, Alessandro Di Carlo (samaritan_o)
Alessandro is and unbelievable talent in the DFIR world, not only do I look forward to anything he writes either on his own site or over on The DFIR Report but on social media also. He knows his stuff and I just don’t say this because he writes at The DFIR Report who in my…
Interview with DFIR Legend Alexis Brignoni
For this interview I have had the please to speak with someone who is so prevalent in DFIR, is very highly thought of and is a pleasure to have got the chance to chat. I have been trying to learn Python for what seems like forever, and it was where I first spent any kind…
HACKTORIA: Prisoner of War – Walkthrough
Hello, Time for another walkthrough from over on Hacktoria, I will get to the more harder ones I just wont to do it in the Easy > Medium > Hard > Insane order. So here we go. Prisoner of WarGreetings Special Agent K. We have an urgent contract for the government of France. After their…