cybersecurity Pentesting 3: Passive Reconnaissance In this next phase, I shift focus to the initial steps in gathering intelligence about the target without direct interaction.
pentesting Pentesting Part 2: Planning This blog explores the pivotal role of planning, emphasizing its significance in ensuring a comprehensive and efficient penetration testing process.
cybersecurity Pentesting Part 1: Intro to External Pentesting Every pentester has their own preferences and approaches to conducting pentests. In this blog, I'll cover the approach and methodologies that I use when I conduct pentests.
phishing Avoid Phishing by Knowing the Signs It's easy to be fooled by phishing attacks if you don't know how to detect the signs that you're being phished. In this blog, I'll dissect a real-world phishing email that was sent to me personally and highlight all of the warning signs in the email.
volatility Carving Sensitive Information from Memory with Volatility In this blog, I'll demonstrate how to carve out a malicious executable found in a memory dump file. I'll also show how to extract password hashes and crack the password from the hash.
python Build a Caesar Cipher in Python The Caesar cipher comes from its namesake: Julius Caesar. It's an antiquated method of encoding a message simply by shifting the characters of the alphabet. With Python, we can easily create our own program to encode and decode messages using a Caesar Cipher.
education Set Up Safe Browsing for Your Kids The internet is a scary place, but there are ways you can protect them from stumbling into the dark corners of the internet!