They See Me Scannin’, They Hatin’: A Beginner’s Guide to Nmap

Estimated Difficulty: πŸ’œπŸ’œπŸ’œπŸ€πŸ€ Recon, Recon, Recon One of the most important phases of an attack, is the reconnaissance phase. Often abbreviated to recon, this phase usually consists of a variety of process and techniques to collect information about a target system. This phase may also be known as “Information Gathering” Continue Reading

Cryptography Terms

Estimated difficulty: πŸ’œπŸ€πŸ€πŸ€πŸ€

Hey! This is a quick, simplified overview of some related terms for anyone who isn’t familiar with cryptography. I’ll add to this as time goes on to try and make sure it includes the terms used in other posts. πŸ₯³

Google knows everything… – Part 1

Estimated difficulty: πŸ’œπŸ€πŸ€πŸ€πŸ€ This post is in collaboration with the infamous OSINT (Open Source INTelligence) hacker @thecyberviking. “Google knows everything… – Part 1” is but one post in a series of OSINT related topics created with the help of that spooky dude! This post on Google Dorking will focus on Continue Reading

Bop to the Top: A Linux Priv Esc. Checklist

Estimated Difficulty: πŸ’œπŸ’œπŸ’œπŸ’œπŸ€ Congratulations, you’ve got a foothold!Now what? Bop to the Top and get yourself some Root! The following blog will detail my own personal checklist that I run through when attempting to privilege escalate in a Linux environment. From my personal experience, it has a fairly good success Continue Reading