Estimated difficulty: 💜🤍🤍🤍🤍 This post is in collaboration with the infamous OSINT (Open Source INTelligence) hacker @thecyberviking. “Google knows everything… – Part 1” is but one post in a series of OSINT related topics created with the help of that spooky dude! This post on Google Dorking will focus on Continue Reading
Bop to the Top: A Linux Priv Esc. Checklist
Estimated Difficulty: 💜💜💜💜🤍 Congratulations, you’ve got a foothold!Now what? Bop to the Top and get yourself some Root! The following blog will detail my own personal checklist that I run through when attempting to privilege escalate in a Linux environment. From my personal experience, it has a fairly good success Continue Reading
System…//…Lockdown
Estimated difficulty: 💜🤍🤍🤍🤍
Welcome to week four of government-mandated sourdough-baking and Netflix-binging, and my first post on Security Queens. 🎉
I’m asked quite often how I managed to get into the security industry, coming from a non-technical background, and for useful resources for people just starting out…
Digispark Programming
Estimated difficulty: 💜💜💜🤍🤍 Welcome to the Beginners guide to Digispark programming! Hardware can be a bit of a mystery, so in terms of understanding it, it is best to start small and complete some fun projects along the way. This article will answer some basic questions, like how to set Continue Reading
I’m in Chroot Jail, Get Me Out of Here!
Estimated Difficulty: 💜💜💜💜🤍 So you’ve hacked it. You got root. Or do you? What is a chroot jail? Chroot jails can fool attackers to think that they supposedly have immediate root privilege access to the environment. Chroot in Unix operating systems help change the apparent root (chroot) directory. I guess Continue Reading