Can’t begin to tell how happy i am to bring to you an interview with Alyssa Miller. It was back in June when I got to know more about Alyssa when I came across her blog post ‘Ethics in Cybersecurity Marketing – Principles of Value Contribution’ which talks about plagiarism in the Cybersecurity and the…
Tag: Ethical Hacking
WINNER: The Security Noob, Best Up & Coming Cybersecurity Blog 2021… FACT
Been planning to post about this for a while but am STILL WAITING FOR MY TROPHY ? Anyways, your boy here only gone and won ‘Best Up & Coming Blog) at the 2021 European Cybersecurity Blog Awards!!!! Absolutely chuffed to bits and couldn’t be happier although its all downhill from here I am afraid ?…
OSINT: Fun with Open Source Intelligence by Pentester Academy (review)
Hello, today I have another review for you and this time from ‘Pentester Academy’. I have a year access to their site/courses/Labs and am aiming to do one a month over the next year alongside courses from other places too, and for the first one I decided to one on the easier side to ease…
Interview with Heath Adams/The Cyber Mentor YouTuber, CEO of TCM Security and Hacker
Hello and welcome to another interview, this time I spoke to a guy with possibly one of the coolest names in Information Security Mr Heath Maverick Adams, how cool of a name is that! Unless this is your first day looking at Information Security, Cyber Security, Ethical Hacking etc I expect you already know him,…
Blue Team Boot Camp: Defending Against Hackers by Jonathan Elliott for CodeRed (Review)
Hey Guys, I just recently finished this course ‘Blue Team Boot Camp: Defending Against Hackers’ over on CodeRed which was taught by the excellent Jonathan Elliott. Recently I started a new job, I think I mentioned previously and in it I am being given the chance to learn some security stuff which I absolutely love,…
Introduction to Malware Analysis for Incident Responders by Jason Dion (Review)
Hey Guys, I finished this recently and wanted to write a little bit about it because it was quite fantastic. What you’ll learn You will understand the steps and processes involved in static and dynamic Malware Analysis You will be able to perform basic dynamic Malware Analysis You will understand the various types of malware…
The Complete Cyber Security Course! Volume 4: End Point Protection by Nathan House (Review)
First of all, I have to apologise for the lack of posts the previous few months. After being put on furlough in April I was made redundant in July so when I wasn’t home-schooling the kids with the wife I was searching for jobs bit I am pleased to say I HAVE ONE and started…
The Complete Cyber Security Course! Volume 3 by Nathan House (Review)
This is the Third volume of the four-volume course and if you haven’t already you can read my review of volume 1 and 2 over here:- VOLUME 1: HACKER’S EXPOSED VOLUME 2: NETWORK SECURITY VOLUME 3: ANONYMOUS BROWSING VOLUME 4: ENDPOINT PROTECTION I have to start by saying how much I am enjoying these courses…
CTF: Bandit Level 1 > 2 Walkthrough
Here we go again with another of the early levels at ‘Over the Wire’, it says for this one. “Level Goal The password for the next level is stored in a file called – located in the home directory Commands you may need to solve this level ls, cd, cat, file, du, find” As usual,…
CTF: Bandit Level 0 > 1 Walkthrough
Technically the first level after SSH into the server, we now need to start finding flags. Level Goal The password for the next level is stored in a file called readme located in the home directory. Use this password to log into bandit1 using SSH. Whenever you find a password for a level, use SSH…