Angel MercadoinLearning CyberSecurityHTTP/DNS/Encrypted data exfiltration techniquesTable of ContentsJun 12Jun 12
Angel MercadoinWriteups/notesRHCSA9 Exam NotesThe following contains my notes for each exam objective for the RHCSA RHEL9 EX200 exam.May 28May 28
Angel MercadoPort forwarding to access a Hyper-V VM· Why Bother setting this up? ∘ Setup ∘ The goal · The LAN problem ∘ Default switch limitations · Figuring out a solution · Putting…May 7May 7
Angel MercadoinLearning CyberSecurityOWASP Top Ten Part 2Today we will be looking at the last 5 web vulnerabilities as defined by the OWASP top 10 list. OWASP maintains a document for web…Dec 14, 2023Dec 14, 2023
Angel MercadoinLearning CyberSecurityOWASP Top Ten Part 1Today we will be looking at the first 5 web vulnerabilities as defined by the OWASP top 10 list. OWASP maintains a document for web…Nov 8, 2023Nov 8, 2023
Angel MercadoinLearning CyberSecurityPerforming a Log Poisoning AttackToday we will be looking at the natas25 challenge from overthewire. We will be exploring how malicious attackers might gain remote code…Oct 22, 2023Oct 22, 2023
Angel MercadoinLearning CyberSecurityPerforming a time-based SQL injectionDemonstrating a time-based injection on the natas17 overthewire challengeOct 13, 2023Oct 13, 2023
Angel MercadoinWriteups/notesPassing the CISSP exam in 60 daysWhat is the CISSP?Oct 6, 2023Oct 6, 2023
Angel MercadoinLearning CyberSecurityBypassing Sophos anti-virus with DDexecUsing DDexec to load a malicious binary in memory to avoid AV detection.Sep 23, 2023Sep 23, 2023
Angel MercadoinLearning CyberSecurity6 methods to setup a network pivotCreating network pivots on both Linux and Windows OS’sSep 16, 2023Sep 16, 2023