Taking the Certified Ethical Hacker (CEH) certification

Taking the Certified Ethical Hacker (CEH) certification from ECCouncil has been on my bucket list for some years now. I planned on taking it five years ago, but never found the time to do it – until this year. In this blogpost I will share how I approached taking this certification! Attending the offical classContinue reading “Taking the Certified Ethical Hacker (CEH) certification”

An Unofficial Guide to Creating CTF VMs

Today I am going to shed some light on how to create a virtual machine for CTF gaming. This tutorial came to life after a discussion on my Discord server on how to distribute CTF games among friends. In this tutorial we’ll create a Debian based virtual machine, prep it with some software – thenContinue reading “An Unofficial Guide to Creating CTF VMs”

Proactive vulnerability scanning

  Today I am demonstration how to proactively work with the results from a vulnerability scanner to secure a server. I will set up a vulnerability scanner to scan a server in my test lab in order to discover how it appears to attackers running similar tools. We will touch upon fixing low hanging fruitsContinue reading “Proactive vulnerability scanning”

Disposable emails

Everybody hates spam. I do. You do (if you don’t I’ll force you to). Waking up to a inbox full of spam from a company you once registered your email address to eons ago is a drag. Especially from those companies offering “free” white papers. Today I’ll look into ways to combat this by lookingContinue reading “Disposable emails”

Fuzzing – CTF primer

Fuzz testing or fuzzing is a technique commonly used in software testing to find how software responds to invalid, unexpected or random data. The targeted software may fail, give unexpected output or misbehave processing the randomized input data. Input that leads to such situations is then addressed and rectified. The term fuzz testing originates from aContinue reading “Fuzzing – CTF primer”

NoSQL prevalence

A database is an organized collection of data. It is the collection of schemas, tables, queries, reports, views and other objects. It’s also a framework for frustration.Trying to get a grip on data organized into a model of aspects in a way that supports processes requiring information, such as modelling the availability of rooms in motels in aContinue reading “NoSQL prevalence”

TAILS OS – privacy for anyone

Keeping your privacy is hard in our world of technology. Luckily there’s a solution available for free for you to stay undercover. Today I’ll be presenting Tails OS – maybe you’ve heard about it, maybe you haven’t. Tag along and maybe it’ll peak your interest! What is it? Tails is a live Linux system aimingContinue reading “TAILS OS – privacy for anyone”

SNMP – basic facts

SNMP stands for Simple Network Management Protocol and is a standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. Typical devices include routers, switches, servers, workstations, printers and modem racks. This protocol exposes system configuration information in the form of variables on the managed devices. These variables can beContinue reading “SNMP – basic facts”

TFTP – Trivial File Transfer Protocol

    TFTP was first defined in 1980 and with later revisions between 1981 and 1998. The name itself is an abbreviation of Trivial File Transfer Protocol. It operates like FTP, but is much simpler. It lacks login and access control mechanisms, it can only store and retrieve files, and it uses no transmission encryption. To make itContinue reading “TFTP – Trivial File Transfer Protocol”

les UX – an aura of secrecy

I’ll let you in on a secret. I love urban exploration (UX). There’s an undefined thing about the whole concept of exploring abandoned buildings and places that peaks my interest. Lately after coming home from work, feeling exhausted, I’ve spent my time reading UX reports. In one of the reports I found a reference to something called lesContinue reading “les UX – an aura of secrecy”