Hello people, I bring some amazing news today, I can offer you 10% discount over on Pentester Academy. Because I am so awesome and spoke with them, they have offered a special rate for security noob readers. They liked my post ‘OSINT: Fun with Open Source Intelligence by Pentester Academy’ so much they want to…
Tag: Hacking

OSINT: Fun with Open Source Intelligence by Pentester Academy (review)
Hello, today I have another review for you and this time from ‘Pentester Academy’. I have a year access to their site/courses/Labs and am aiming to do one a month over the next year alongside courses from other places too, and for the first one I decided to one on the easier side to ease…

Interview with Heath Adams/The Cyber Mentor YouTuber, CEO of TCM Security and Hacker
Hello and welcome to another interview, this time I spoke to a guy with possibly one of the coolest names in Information Security Mr Heath Maverick Adams, how cool of a name is that! Unless this is your first day looking at Information Security, Cyber Security, Ethical Hacking etc I expect you already know him,…

Introduction to Malware Analysis for Incident Responders by Jason Dion (Review)
Hey Guys, I finished this recently and wanted to write a little bit about it because it was quite fantastic. What you’ll learn You will understand the steps and processes involved in static and dynamic Malware Analysis You will be able to perform basic dynamic Malware Analysis You will understand the various types of malware…

Interview with award-winning Security Blogger, Researcher, Podcaster and Public Speaker Graham Cluley
Apologies for the lack of posts of late was really busy working from home and the with all this Corona/COVID 19 stuff I have been made furloughed so have been at home for the last week helping the wife home school. All the rubbish aside I am super excited to bring you this interview I…

PowerShell for Hackers (W41) by Atul Tiwari for Hakin9 (Review)
Hey guys, Back with another review on a course, I have just finished it and as you can see from the title it’s a course using PowerShell for hacking so something totally different to what I have been doing with Linux, Kali, Parrot and suck so far. The concept of using windows for hacking is…

The Complete Cyber Security Course! Volume 3 by Nathan House (Review)
This is the Third volume of the four-volume course and if you haven’t already you can read my review of volume 1 and 2 over here:- VOLUME 1: HACKER’S EXPOSED VOLUME 2: NETWORK SECURITY VOLUME 3: ANONYMOUS BROWSING VOLUME 4: ENDPOINT PROTECTION I have to start by saying how much I am enjoying these courses…

Interview with Cybersecurity Expert and Writer Daniel Miessler
Today I am posting an interview I have done with cybersecurity expert speaker, podcaster, author and author Daniel Miessler and I am super happy I got the chance to speak with him. He has probably one of the most viewed blog posts out there on starting in cybersecurity and certainly one that I was pointed…

CTF: Bandit Level 2 > 3 Walkthrough
Hello, welcome back if you are reading along, here is the next walkthrough. Level Goal The password for the next level is stored in a file called spaces in this filename located in the home directory Commands you may need to solve this level ls, cd, cat, file, du, find As usual, I will run…

CTF: Bandit Level 1 > 2 Walkthrough
Here we go again with another of the early levels at ‘Over the Wire’, it says for this one. “Level Goal The password for the next level is stored in a file called – located in the home directory Commands you may need to solve this level ls, cd, cat, file, du, find” As usual,…