Estimated difficulty: πππππ€ Hulk, smash? Stacks, that is! Welcome to another strictly hax-themed blog, and something a little out of my comfort zone I must say – so if there are any constructive criticisms or feedback… Please let me know! This month we are covering the basics of stack smashing Continue Reading
Zoning Out: An Introduction to DNS Zone Transfers
Estimated difficulty: πππ€π€π€ DNS (Domain Name System) zone transfers are used to help replicate databases across different domain servers, allowing administrators to modify or edit records easily by implementing the changes on one server and copying the changes to the others. Zone transfers are completed using the AXFR protocol, and Continue Reading
Light ’em Up: An Introduction to LiDAR
Estimated difficulty:Β πππ€π€π€ It’s been a while since I’ve written about zoom hax, if you’re new to Security Queens – you can find my last blog post on hacking cars via. the Control Area Network (CAN) here. Instead of focusing on physical CAN bus hacking, this blog post will do Continue Reading
Who Ya Gonna Call? DirBuster!
Estimated difficulty: πππ€π€π€ Need to bruteforce directory names on a web application? Or perhaps you need to find unlisted files on a web server? Who ya gonna call? DIRBUSTER! So first thing’s first, the boring pentesty theory bit before we do all the mad hax and walkthrough the basics of Continue Reading
Stressed Out, Burned Out, and a I Feel Like a Fake
I’ve always been a perfectionist. I’ve always striven to be the best version of me that I could be! When I started in university and my journey into cybersecurity, I pushed myself to stand out, be “perfect” and to do it with no mistakes. An impossible task, I realise now, Continue Reading
Risky Business: A Down-Low on Risk Management Basics
Estimated difficulty: ππ€π€π€π€ First thing’s first! Let’s talk definitions. So, what actually is risk management? To put it simply, it is the management of the risk within an organisation (doh!). The risk management process involves identifying security risks and creating and implementing plans to mitigate them. Defining Risk Risk is Continue Reading
Subnetting IPv4 – TL;DR
Estimated difficulty: ππππ€π€
Every time I attend a course and someone tries to explain subnetting to me, they pretty much un-teach me it and I have to go away and re-learn how it works.
Locked Out: What is Ransomware?
Estimated difficulty: ππ€π€π€π€ Ransomware can be a costly attack to organisations of all sizes. Recently Garmin fell victim to a ransomware attack, with reported ransoms of up to US$10 million in exchange to reinstate company files. According to a The State of Ransomware 2020 by Sophos, the global average cost Continue Reading