-
Privilage Escalation
Information Gathering What’s the OS? What version? What Architecture? Who are we? Where are we? Who uses the box? What users? (And which ones have a valid shell) What’s currently running on the box? What active network services are there? What’s installed? What kernal is being used? Then using this information, we can help answer…
-
Tool Time: enum4linux-ng
I’ve learned about many different tools that can be useful for CTF (Capture the Flag) competitions and other security-related activities. In this article, I’ll be focusing on one of these tools: enum4linux and its successor, enum4linux-ng. Both of these tools are designed to help with the enumeration of Windows and Samba systems, allowing security professionals…
-
Cybersecurity Enumeration: Passive Information Gathering 1/3
In this article, we will delve into the world of cyber security and discuss various techniques and tools that can aid in capturing the flag in CTFs or enhancing one’s overall knowledge in this field. It is important to note that the domain of cyber security is vast and constantly evolving, with new technologies and…
-
Cyber Security Multi-Tool: Flipper Zero
Today, I’d like to share my thoughts on a cutting-edge tool that has recently gained immense popularity in the market and has been making waves on TikTok. Despite being a bit late to the party, I still think this tool is worth mentioning due to its cool features and ability to educate those interested in…
-
Get Your Dream Cybersecurity Job by Creating a Resume-Website
Building Credibility Continuing on the topic of how to improve yourself and land that dream job, it’s important to note that one of the key factors in standing out from other job applicants is effectively advertising yourself. A great way to do this is by creating a personal website where you can showcase your skills,…
-
Mastering Cybersecurity: How to Improve Your Skills and Land Your Dream Job
Ok, I graduated. Now what? In my previous blog post, I mentioned that after graduating from university, I felt like my education was not comprehensive enough. I found that companies were looking for more than just a degree and I realized that the days of a degree being enough were over, unless you got lucky.…
-
Chat-GPT3 in Cyber Security
In this blog post, I will be discussing the impact of ChatGPT-3 on the field of cyber security and its potential uses for learning. Additionally, I will address the risks of adversaries using it for attacks and share my personal opinion on the tool. Cyber security is a constantly evolving field and new technologies like…
-
Is Formal Education Necessary for a Career in Cybersecurity?
Disclaimer This is a complex question. I will do my best to provide an answer, but keep in mind that this is my personal opinion and that the landscape is constantly changing. I hope that readers will be able to gain valuable information from my response and that I can guide you in the right…
-
How I got into Cyber Security
Everyone’s path into cyber security is unique, with its own twists and turns. There is no one-size-fits-all approach to achieving success in the field, especially when it comes to personal goals. In this post, I’ll be sharing my personal journey on how I got started in cyber security. Ever since I was a kid As…
-
Warm Introduction — Firewall Chronicles
Welcome to my cyber security blog, Firewall Chronicles! Who am I ? I’m excited to introduce myself as an expert in the field of cyber security with a formal education in both cyber security and computer science. I have experience working in the field and I am currently in a position where I am able…