Estimated difficulty: 💚🤍🤍 If you are a newbie in security and want to start learning about Unix, then this is a great post for you. This will be a quick fire post on file permissions. What do they mean and some of the vulnerabilities you might spot out in the Continue Reading
Deauth Yourself: How to Build a Deauthenticator
Estimated difficulty: 💜🤍🤍🤍 🤍 Welcome to the wonderful world of hardware. This blog post is a walkthrough of how to build a deauthenticator; a pocket-sized tool that you can create to kick a device off of a network (especially good to know for April fools, or if you just want Continue Reading
Web(uilt) This City on Rock and Roll: An Intro to Web Hacking
Estimated difficulty: 💚💚💚 Hey Securiteenies! And welcome to another blog written just for you. Following on from Sarah’s “Castle on a Cloud” post about the basics of the internet – are you ready to learn a little bit about web hacking? First of all let’s recap… The Internet vs. the Continue Reading
Castle on a Cloud
Estimated difficulty: 💚💚🤍 It’s a wonder what is up in those clouds, clouds can mean many different things in this day and age. Clouds live in the sky, there is something called cloud computing and more importantly, (for this article) clouds can represent the internet – especially in a network Continue Reading
Binary, Hex, Base 64, Oh My!
Estimated difficulty: 💚💚💚 Hey Securiteenies! This week we’re covering a few common numerical systems in the technology world – mostly because they’re really cool, but also because you might come across these in the wild sometime and it’s useful to know how they work and understand what they mean. We’ve Continue Reading
Pi Projects – Flashing Kali Linux
Estimated difficulty: 💚💚💚 Welcome to my first blog post for Securiteenies! We’ve created a difficulty rating based on a 3 heart system. Since the summer holidays have kicked off, we’d like to help you learn some fun skills over your lock-down break. This post was inspired by a question asking Continue Reading