Socat is similar to netcat in some ways, but fundamentally different in many others. The easiest way to think about socat is as a connector between two points. In the interests of this room, this will essentially be a listening port and the keyboard, however, it could also be a listening port and a file,… Continue reading Socat
Reverse Shell Cheat Sheet
If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you’ll probably want an interactive shell. If it’s not possible to add a new account / SSH key / .rhosts file and just log in, your next step is likely to be either trowing back a reverse shell or binding… Continue reading Reverse Shell Cheat Sheet
Setting Up A Live Stream The Hard Way
So doing a live stream broadcast involves more than just buying a webcam and microphone then going live via YouTube or Facebook. In-fact what if you don’t want to use any of those platforms and provide a small (under 500 people) ticketed stream? This will follow a real world project where I setup a live… Continue reading Setting Up A Live Stream The Hard Way
CISCO Cybersecurity Pathway
I didn’t start taking notes for the first few badges because 90% is repeat material from previous courses and now I’ve come to a point where I need to start learning… Pathway Intro to Cybersec (Course) Networking Basics (Course) Networking Devices & Configuration (Course) Endpoint Security (Course) Network Defense (Course) Cyber Threat Management (Course) Cybersecurity… Continue reading CISCO Cybersecurity Pathway
Complete Pentesting Bundle (CodeRed)
I’ve purchased The Complete Pentesting Bundle at 60% discount, too good to pass up, so now I have another blog post to smash through…
Google IT Automation with Python – M1
This program builds on your IT foundations to help you take your career to the next level. It’s designed to teach you how to program with Python and how to use Python to automate common system administration tasks. You’ll also learn to use Git and GitHub, troubleshoot and debug complex problems, and apply automation at… Continue reading Google IT Automation with Python – M1
cPanel WHM Admin
Mail Administration – T300 Understanding Mail Server The following options found in the Exim Configuration Manager – Basic Editor interface in WHM enables the contact of the sender’s mail server to see if the sender exists? Sender Verification Callouts The following items from the WHM Home » Service Configuration » Exim Configuration Manager – Basic Editor interface would allow you… Continue reading cPanel WHM Admin
Google IT Support Professional – M5
These are notes for the IT Support Professional Certification delivered by Google in partnership with Coursera. This program is ACE® approved—when you complete, you can earn up to 12 college credits, the equivalent of 4 associate degree-level courses.
Google IT Support Professional – M4
These are notes for the IT Support Professional Certification delivered by Google in partnership with Coursera. This program is ACE® approved—when you complete, you can earn up to 12 college credits, the equivalent of 4 associate degree-level courses.
Google IT Support Professional – M3
These are notes for the IT Support Professional Certification delivered by Google in partnership with Coursera. This program is ACE® approved—when you complete, you can earn up to 12 college credits, the equivalent of 4 associate degree-level courses.
Splunk Enterprise Security: Overview
This course was delivered by By Joe Abraham via Pluralsight.
Google IT Support Professional – M2
These are notes for the IT Support Professional Certification delivered by Google in partnership with Coursera. This program is ACE® approved—when you complete, you can earn up to 12 college credits, the equivalent of 4 associate degree-level courses.
Google IT Support Professional – M1
These are notes for the IT Support Professional Certification delivered by Google in partnership with Coursera. This program is ACE® approved—when you complete, you can earn up to 12 college credits, the equivalent of 4 associate degree-level courses.
HTB: Tier 0
This is an introduction to Hack The Box. Free Modules Only.
Advanced Diploma in Computer Networks and Internet Protocol
This course is delivered by National Programme on Technology Enhanced Learning.
Security for Hackers and Developers: Overview
This course was delivered by Dr. Jared DeMott via Pluralsight. This course will cover the following information: Code Auditing Fuzzing Reverse Engineering Exploitation
Security Awareness: Phishing – How Hackers Get Your Secrets
This course was delivered by By Jason Helmick via Pluralsight. I have altered some of the information so it is relevant to Australia.
Evilzone.org Challenge Notes
Evilzone note and stats. No final solutions in here.
Ubuntu, Apache2, PHP & MySQL
Install a stack and Lets-encrypt.
Clean Ubuntu
keep it all clean!
Common Ubuntu
Linux Notes for Ubuntu
Linux Location Description
Cat Data_Source
LilyGo BadUSB
Why you shouldn’t throw any USB into your USB drive.
BLE with ESP32
Bluetooth tinkering. Chips needed for some tools.
GPG Encryption (terminal)
Using PGP Encryption in linux terminal
Quick Nmap Reference
Scan a local network for devices
Standard routine for Wifi
Basic Wifi Test in linux when using AR9271