Skip to content
Primary Menu
  • Welcome
  • About Us
    • Legacy Members
  • Blog
    • Rapid Reads
    • Awareness
    • Cloud
    • Cryptography
    • Development
    • Learning Resources
    • Penetration Testing
    • Securiteenies
    • OSINT
    • Threat Intelligence
    • Wireless
    • Best Practice
    • Special Interest
    • Technical Fundamentals
    • Web
    • Mobile
    • Fraud
    • Frida
    • Governance, Risk and Compliance
  • Newsletter
  • Talks
  • Pin Posts
  • Pin Posts
Security Queens

Welcome to our Blog!

Securiteenies

  • Home
  • Blog 🤓
  • Securiteenies
Category: Securiteenies/Technical Fundamentals

Understanding Unix File Permissions

Posted On 1 April 20221 April 2022 By Sarahcomment

Estimated difficulty:  💚🤍🤍 If you are a newbie in security and want to start learning about Unix, then this is a great post for you. This will be a quick fire post on file permissions. What do they mean and some of the vulnerabilities you might spot out in the Continue Reading

Category: Development/Hardware/Securiteenies

Deauth Yourself: How to Build a Deauthenticator

Posted On 4 February 202227 January 2022 By Sarahcomment

Estimated difficulty:  💜🤍🤍🤍 🤍 Welcome to the wonderful world of hardware. This blog post is a walkthrough of how to build a deauthenticator; a pocket-sized tool that you can create to kick a device off of a network (especially good to know for April fools, or if you just want Continue Reading

Category: Securiteenies/Web

Web(uilt) This City on Rock and Roll: An Intro to Web Hacking

Posted On 4 December 20203 December 2020 By Sophiacomment

Estimated difficulty: 💚💚💚 Hey Securiteenies! And welcome to another blog written just for you. Following on from Sarah’s “Castle on a Cloud” post about the basics of the internet – are you ready to learn a little bit about web hacking? First of all let’s recap… The Internet vs. the Continue Reading

Category: Securiteenies

Castle on a Cloud

Posted On 6 November 20201 April 2022 By Sarah3 Comments

Estimated difficulty: 💚💚🤍 It’s a wonder what is up in those clouds, clouds can mean many different things in this day and age. Clouds live in the sky, there is something called cloud computing and more importantly, (for this article) clouds can represent the internet – especially in a network Continue Reading

Category: Securiteenies/Technical Fundamentals

Binary, Hex, Base 64, Oh My!

Posted On 7 August 202012 August 2020 By Morgancomment

Estimated difficulty: 💚💚💚 Hey Securiteenies! This week we’re covering a few common numerical systems in the technology world – mostly because they’re really cool, but also because you might come across these in the wild sometime and it’s useful to know how they work and understand what they mean. We’ve Continue Reading

Category: Securiteenies

Pi Projects – Flashing Kali Linux

Posted On 31 July 20201 August 2020 By Sarah2 Comments

Estimated difficulty: 💚💚💚 Welcome to my first blog post for Securiteenies! We’ve created a difficulty rating based on a 3 heart system. Since the summer holidays have kicked off, we’d like to help you learn some fun skills over your lock-down break. This post was inspired by a question asking Continue Reading

Load More Posts

Socials