Blog Posts
Introduction to the Network Scanning Phase
The second most important phase is the scanning phase which allows the hacker to interact with the target by utilising tools like nmap and hping.
Introduction to the Reconnaissance Phase
The first phase for any hacker is information gathering and reconnaissance. This post explains some of the key concepts and some tools.
Building a Kubernetes Cluster with Pis
Learn how I created a supercomputer by combining the power of 4 Raspberry Pi’s into one powerhouse and ran a Kubernetes cluster off it.