Can’t begin to tell how happy i am to bring to you an interview with Alyssa Miller. It was back in June when I got to know more about Alyssa when I came across her blog post ‘Ethics in Cybersecurity Marketing – Principles of Value Contribution’ which talks about plagiarism in the Cybersecurity and the…
Tag: Hack
(CRTO) Certified Red Team Operator Review by Zero Point Security REVIEW
Hey Guys, so I have been working through this ‘Red Team Ops’ ALL WEEKEND (well technically Thursday) and thought I would write about it. Course Overview:- “Red Team Ops is an online course that teaches the basic principals, tools and techniques, that are synonymous with red teaming. Students will be granted access to the course…
Just Completed ‘Cyber Defence Pathway’ at TryHackMe.
Hello Guys, So I thought I would share this today as I’ve just finished the ‘Cyber Defence Pathway’ over at TryHackMe. The pathway has THIRTY NINE rooms in it and is set to take you approximately FORTY EIGHT hours but counting up was probably closer to fifty two or so. “Cyber DefenseThe Cyber Defense path…
The Art of Exploitation Course by Mohamed Atef for Station X (Review)
Hey Guys, Back with another review and this time, it is ‘The Art of Exploitation’. This course if taught by Mohamed Atef:- “Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience. CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+” Course…
PowerShell for Hackers (W41) by Atul Tiwari for Hakin9 (Review)
Hey guys, Back with another review on a course, I have just finished it and as you can see from the title it’s a course using PowerShell for hacking so something totally different to what I have been doing with Linux, Kali, Parrot and suck so far. The concept of using windows for hacking is…
The Complete Cyber Security Course! Volume 3 by Nathan House (Review)
This is the Third volume of the four-volume course and if you haven’t already you can read my review of volume 1 and 2 over here:- VOLUME 1: HACKER’S EXPOSED VOLUME 2: NETWORK SECURITY VOLUME 3: ANONYMOUS BROWSING VOLUME 4: ENDPOINT PROTECTION I have to start by saying how much I am enjoying these courses…
CTF: Bandit Level 2 > 3 Walkthrough
Hello, welcome back if you are reading along, here is the next walkthrough. Level Goal The password for the next level is stored in a file called spaces in this filename located in the home directory Commands you may need to solve this level ls, cd, cat, file, du, find As usual, I will run…
CTF: Bandit Level 1 > 2 Walkthrough
Here we go again with another of the early levels at ‘Over the Wire’, it says for this one. “Level Goal The password for the next level is stored in a file called – located in the home directory Commands you may need to solve this level ls, cd, cat, file, du, find” As usual,…
CTF: Bandit Level 0 > 1 Walkthrough
Technically the first level after SSH into the server, we now need to start finding flags. Level Goal The password for the next level is stored in a file called readme located in the home directory. Use this password to log into bandit1 using SSH. Whenever you find a password for a level, use SSH…
CTF: Bandit Level 0 Walkthrough
These first few posts on the CTF challenges at ‘Over the Wire’ will be pretty short and basic which I am ok with, the whole purpose of ‘Over the Wire’ is to go from being an absolute beginner with ‘Bandit0 to Bandit34’ through to the others like Narnia and Maze. Suggested order to play the…