Brief Setup Hardware: 1x Kali Virtual Machine File Location: /home/kali/Desktop/Malware/FollinaChallenge/sample/sample.doc Questions Question 1) What is the SHA1 hash value of…
Brief Setup Hardware: 1x Kali Virtual Machine File Location: /home/kali/Desktop/Malware/FollinaChallenge/sample/sample.doc Questions Question 1) What is the SHA1 hash value of…
Incident response is a key element of SOC and having the appropriate resources and procedures in place beforehand is a…
I am happy to announce I have taken and passed the examination for the CYSA+ examination. While I should be…
As we move onto preparing for the CYSA+ 002 exam I am going to be reinforcing some of my learning…
11 April 2023 Moving briskly on from my pass yesterday I’ve purchased some content material for the CYSA+ exam, purchased…
So it’s been a couple of months since I’ve last posted. I promise I haven’t given in but as my…
Social Engineering Techniques Phishing Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source….
Hi all, this is a dictionary page! SYO-601 covers a lot of content in a fairly shallow manner. Rather than…
Welcome to Day 2. today we’re covering the Cyber Kill Chain. The Cyber Kill Chain is an attack framework is…
A list of terms I’ve run into during my learnings. This is currently in excel form for easy manipulation, however…