SANS Certification Renewals
Today, I had a lovely bill in my inbox for about 450 dollars for the privilege of keeping my GCIH
Cybersecurity Resume Guidance
One of the volunteer activities I do is working with military veterans to improve their resumes. I wanted to publish
Hack the Box (HtB) Walkthrough: Nibbles
Nibbles is an "Easy" Hack the Box machine that uses weak passwords, a malicious upload exploit vulnerability, and sudo misconfigurations.
Hack the Box (HtB) Walkthrough: Optimum
Today, we will look at the Hack the Box "Easy" ranked retired box called Optimum. This box is from the
Hack the Box (HtB) Walkthrough: Shocker
This is a walkthrough for solving the Hack the Box machine called Shocker. Shocker is an Easy machine. It is
Hack the Box (HtB) Walkthrough: Blue (with bonus Kali initial setup)
Blue is marked as a Windows "Easy"-level machine.
Kali Setup
For this walkthrough, the attack box is a fresh
Hack the Box (HtB) Walkthrough: Bashed
Bashed is a retired "Easy" Linux box on Hack the Box. This box is from the list of Hack the
Google Voice Verification Scam
If you hang around Facebook Marketplace, Craigslist, etc., you might run into this phishing scam.
Has anyone ever messaged you
How I Studied for the CompTIA Security+ Exam (S+)
After publishing my last article on how I got my Network+ exam, my veteran security group members said I should
How to Use Nmap for Host Enumeration
Nmap is a robust network scanning, and host enumeration program developed originally by Gordon Lyon. Nmap is free and open-source,