Hey Guys, I finished this recently and wanted to write a little bit about it because it was quite fantastic. What you’ll learn You will understand the steps and processes involved in static and dynamic Malware Analysis You will be able to perform basic dynamic Malware Analysis You will understand the various types of malware…
Tag: Hacking
Interview with award-winning Security Blogger, Researcher, Podcaster and Public Speaker Graham Cluley
Apologies for the lack of posts of late was really busy working from home and the with all this Corona/COVID 19 stuff I have been made furloughed so have been at home for the last week helping the wife home school. All the rubbish aside I am super excited to bring you this interview I…
PowerShell for Hackers (W41) by Atul Tiwari for Hakin9 (Review)
Hey guys, Back with another review on a course, I have just finished it and as you can see from the title it’s a course using PowerShell for hacking so something totally different to what I have been doing with Linux, Kali, Parrot and suck so far. The concept of using windows for hacking is…
The Complete Cyber Security Course! Volume 3 by Nathan House (Review)
This is the Third volume of the four-volume course and if you haven’t already you can read my review of volume 1 and 2 over here:- VOLUME 1: HACKER’S EXPOSED VOLUME 2: NETWORK SECURITY VOLUME 3: ANONYMOUS BROWSING VOLUME 4: ENDPOINT PROTECTION I have to start by saying how much I am enjoying these courses…
Interview with Cybersecurity Expert and Writer Daniel Miessler
Today I am posting an interview I have done with cybersecurity expert speaker, podcaster, author and author Daniel Miessler and I am super happy I got the chance to speak with him. He has probably one of the most viewed blog posts out there on starting in cybersecurity and certainly one that I was pointed…
CTF: Bandit Level 2 > 3 Walkthrough
Hello, welcome back if you are reading along, here is the next walkthrough. Level Goal The password for the next level is stored in a file called spaces in this filename located in the home directory Commands you may need to solve this level ls, cd, cat, file, du, find As usual, I will run…
CTF: Bandit Level 1 > 2 Walkthrough
Here we go again with another of the early levels at ‘Over the Wire’, it says for this one. “Level Goal The password for the next level is stored in a file called – located in the home directory Commands you may need to solve this level ls, cd, cat, file, du, find” As usual,…
CTF: Bandit Level 0 > 1 Walkthrough
Technically the first level after SSH into the server, we now need to start finding flags. Level Goal The password for the next level is stored in a file called readme located in the home directory. Use this password to log into bandit1 using SSH. Whenever you find a password for a level, use SSH…
CTF: Bandit Level 0 Walkthrough
These first few posts on the CTF challenges at ‘Over the Wire’ will be pretty short and basic which I am ok with, the whole purpose of ‘Over the Wire’ is to go from being an absolute beginner with ‘Bandit0 to Bandit34’ through to the others like Narnia and Maze. Suggested order to play the…
Interview With Cybercrime Expert and OSINT Specialist Under the Breach (you’ve probably seen them in the news).
As mentioned in previous articles I am absolutely fascinated with ‘OSINT’ (Open-Source Intelligence) and ‘Information Gathering’ when it comes to ethical hacking and cybersecurity, maybe I am some kind of voyeur who likes snooping but I suppose it’s always been there as I love people watching when travelling, I used to travel a lot in…