Blog Posts
Introduction to Penetration Testing Documentation
In this post, I will do a brief overview of the reporting phase of a pentest and cover a high-level description of what should be included and things to look out for when writing a report.
Introduction to Securing Cyber Physical Systems
In Part 9 of this new Cyber Physical Systems series, I will introduce the different methods and techniques to securing cyber physical systems since we now know how vulnerable they are.
Introduction to Cyber Physical System Vulnerabilities
In Part 8 of this new Cyber Physical Systems series, I will introduce the different types of vulnerabilities that these systems have and why they are so vulnerable.
Introduction to Attacks on Cyber Physical Systems
In Part 7 of this new Cyber Physical Systems series, I will introduce the different types of attacks that can target these type of systems and discuss the different layers where they occur.
Introduction to Cyber Physical System Challenges
In Part 6 of this new Cyber Physical Systems series, I will introduce the different challenges when it comes to securing and managing cyber physical systems.
Introduction to the Modbus Protocol
In Part 5 of this new Cyber Physical Systems series, I will introduce the Modbus protocol which is widely used in ICS/CPS and cover its data types and functions.
Introduction to Industrial Control Systems
In Part 4 of this new Cyber Physical Systems series, I will introduce the concept of industrial control systems along with their components and different types of ICS.
Introduction to Control Systems
In Part 3 of this new Cyber Physical Systems series, I will introduce the concept of control systems, classifications, controller design and ideal control system characteristics.
Domains and Applications of CPS
In Part 2 of this new Cyber Physical Systems series, I will discuss the different domains and applications of CPS in the real world including various examples and will also start to discuss the overall architecture.
What are Cyber Physical Systems?
In Part 1 of this new Cyber Physical Systems series, I will discuss what CPS is, where it came from, a definition of CPS along with examples and some more beginner information.
Introduction to Different Types of Malware and Viruses
Welcome to the exciting phase. This is the phase most people think of when the word “hacking” is mentioned - launching exploits, gaining access to computers and more!
Introduction to Network Attacks and DoS Attacks
This phase covers network attacks ranging from recon attacks, access attacks up to the concept of DoS attacks and more modern examples in order to get an idea of the various attacks going on every day.
Introduction to Social Engineering
Welcome to the social engineering phase. Ever wanted to hack humans, but don’t have the biological knowledge to do so? Well, social engineering is for you!
Introduction to Password Cracking Techniques
This is the phase that can give you that adrenaline rush - we crack users passwords (hopefully) to potentially gain access and do some more ethically nefarious things.
Mandiant - Azure Red Team Workshop Writeup
This is a vulnerable-by-design Azure lab containing 2 x attack paths with common misconfigurations. These vulnerabilities are intended to represent those found in live production environments.
Introduction to the Exploitation Phase of Hacking
Welcome to the exciting phase. This is the phase most people think of when the word “hacking” is mentioned - launching exploits, gaining access to computers and more!
Introduction to Vulnerability Scanning and Tools
A common yet effective method for finding vulnerabilities is by utilising various vulnerability scanning tools like Nessus and OpenVAS. Learn about them here.
Introduction to the Network Scanning Phase
The second most important phase is the scanning phase which allows the hacker to interact with the target by utilising tools like nmap and hping.
Introduction to the Reconnaissance Phase
The first phase for any hacker is information gathering and reconnaissance. This post explains some of the key concepts and some tools.
Introduction to Legal Issues in Cybersecurity
Just as it is important to know security definitions before getting technical, it is arguably even more important to understand the law surrounding it.