SECURITY HYGIENE DONE CORRECTLY

Why did plague doctors wear those strange beaked masks? In the 17th century, people believed these outfits could purify poisonous air. They were wrong. “[…] physicians believed that the plague spread through poisoned air that could create an imbalance in a person’s humors, or bodily fluids. Sweet and pungent perfumes were thought to be able […]

Read More SECURITY HYGIENE DONE CORRECTLY

THREAT MODELING MADE SIMPLE

When a building is to be constructed, the strength of the components used for the construction is calculated before the actual and practical building phase takes place. The material used, for example, for the fundament, beams, floors, walls etcetera of the building is not something that is thrown in without contemplation or calculation. The same […]

Read More THREAT MODELING MADE SIMPLE

WHO SHOULD LEARN ETHICAL HACKING?

“To know your enemy, you must become your enemy.”. Sunz Tzu, The Art of War If you want to learn and get a deeper knowledge of how attacks are conducted from a more technical point of view from an adversarial perspective, I recommend you learn ethical hacking. There is definitely an added value for security […]

Read More WHO SHOULD LEARN ETHICAL HACKING?

WHAT IS THREAT MODELING?

Threats are those things that we can not control. What I mean by this is that threats, when it comes to security, are mainly driven (when there is a human behind the actions) by motivation and skills/capabilities. To give an analogy on Threats, in traffic example, when you drive a car there are different kinds […]

Read More WHAT IS THREAT MODELING?

GAMING FOR SECURITY ENTHUSIASTS

TERMINAL TERMINAL ┌──(kali㉿kali)-[~] nmap -sC -sV -T4 W.X.Y.Z Starting Nmap at XXX-YY-ZZ Nmap scan report (Z.Y.X.W) Host is up, Not shown: 995 filtered ports Reason: 995 no-responses PORT STATE SERVICE22/tcp open ssh 53/tcp open domain80/tcp open http443/tcp open httpsMAC Address: ##:##:##:##:##:## (Nmap done: 1 IP address scanned) ┌──(kali㉿kali)-[~] gobuster dir -u W.X.Y.Z -w /home/kali/small.txt ==================================== […]

Read More GAMING FOR SECURITY ENTHUSIASTS