MichaelLearns_Network Traffic Analysis — BURNINCANDLE — Walkthrough Part 1This is part 1 of a walkthrough I have done for one of my digital forensic class. I thank all my students for their continued enthusiasm…Aug 231Aug 231
MichaelLearns_Metasploitable 2 — Walkthrough — SMTP Enumeration TechniquesThese articles are some of my notes as I practice my penetration testing knowledge targeting the Metasploitable 2 box. The contents and…Jul 11Jul 11
MichaelLearns_Metasploitable 2 — Walkthrough — SMB Exploit TechniquesThese articles are some of my notes as I practice my penetration testing knowledge targeting the Metasploitable 2 box. The contents and…May 17May 17
MichaelLearns_Metasploitable 2 — Walkthrough — SMB Enumeration TechniquesThese articles are some of my notes as I practice my penetration testing knowledge targeting the Metasploitable 2 box. The contents and…May 9May 9
MichaelLearns_Metasploitable 2 — Walkthrough — FTP — vsftpd 2.3.4This series of article are some of my notes as I practice my penetration testing knowledge on the Metasploitable 2 box. The contents along…Apr 12Apr 12
MichaelLearns_I just passed my eJPT Certification Exam! Top 5 tools that I’ve used.After several months of preparation, I finally went ahead and finished my elearning Junior Penetration Tester (eJPT) certification. Im so…Mar 222Mar 222
MichaelLearns_Beyond Metasploit and Shells: The Non-technical skills cybersecurity professionals should have.Well, that was a long title! But here are some of my thoughts as I start my cybersecurity journey and some of the soft skills that I have…Feb 9Feb 9
MichaelLearns_The Smiley Face BackdoorAs I was preparing for my eJPT certification over the last few months, I encountered this very memorable backdoor for a network service…Jan 6Jan 6
MichaelLearns_Threat Hunting with Security Blue TeamI had a little break for my penetration testing certification prep this month and decided to spend a bit of time learning more about Threat…Dec 30, 2023Dec 30, 2023