Note Taking Presentation









Additional: I use the Cornell note taking method. You can find out more here: https://en.wikipedia.org/wiki/Cornell_Notes

Additional: I use the Cornell note taking method. You can find out more here: https://en.wikipedia.org/wiki/Cornell_Notes
A lot of us are familiar with Hack the Box, but I hadn't really delved into Academy or the modules within until deciding to explore the content for the CPTS certification. With a new certification comes new material to learn and despite this machine having a write-up, I
Disclaimer: Could this post be social suicide? Sure, that's a distinct possibility, given that I typically refrain from sharing opinions to steer clear of associated stigma. However, there is an elephant spraying everywhere and we've just been contentedly sitting in a muddy space grinning at its
This three-part series is intended to provide clarity on frequently encountered SSL-related issues in penetration tests. It includes a brief explanation of attacks, resources, and a cheat-sheet for quick validation in part two.
With the holiday season in full swing, a multitude of people are looking to embark on fresh journeys and goals for the emergence of the new year. I am no exception to this rule, and have been investigating different avenues for growth, one of which we will be exploring today.