This is a transcript of my eponymous presentation at Confoo 2021.

Title slide

So, What is technical debt? And how do we talk about it?

We’ve all used that term: “technical debt”, “tech debt”, but has it been really useful? We keep struggling with maintenance, development hurdles, and lack of understanding of…


Network Mapper: Network exploration tool and security / port scanner

Probing

-Pn Skip discovery phase (treat all hosts as online)

Scanning

-sS SYN scan

-sTfull TCP scan

-sV version scan

Scripting

--script-help [default] print script’s info

--script run script

SANS nmap Cheatsheet v1.0

Arbitrary TCP and UDP connections and listens

Scan for listening daemon, without sending data

BSD
> nc -z example.com 20-30
GNU
> nc -zv example.com 20-30

Client/Server

BSD
> nc -l 1234 # server
> nc example.com 1234 # client> nc -l 1234 > out.txt # server> nc example.com 1234 < in.txt # clientGNU
> nc -lp 1234
BSD man page

Nearly every character in American Kingpin seems to have wandered in from one Coen brothers movie or another — Ulbricht’s girlfriend is a born-again Christian who runs an erotic photography business; one of his chief confidantes is an undercover DEA agent who begins stealing from him; and the man who…


Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency

Author

I (Parmy Olson) cover developments in AI, robotics, chatbots, digital assistants and emerging tech in Europe. I’ve spent close to a decade profiling the hackers and dreamers who are bringing the most cutting-edge technology into our lives, for better or worse. I’m the author of “We Are Anonymous: Inside the…


César Hidalgo has a radical suggestion for fixing our broken political system: automate it! In this provocative talk, he outlines a bold idea to bypass politicians by empowering citizens to create personalized AI representatives that participate directly in democratic decisions. Explore a new way to make collective decisions and expand your understanding of democracy.
— TED


“Configuration guidelines for various technology groups to safeguard systems against today’s evolving cyber threats”

As I’m spinning up new machines and VMs, and at the recommendation of BHIS, I looking at the CIS Benchmarks.

Checkout my ongoing Ansible implementation:


A Dell PowerEdge R900

Got a used Dell PowerEdge R900 for $300. This beast comes with:

  • 4 Intel Xeon E7440 Quad Core 2.40Ghz with Intel virtualisation technology (VT-x)
  • 64Go RAM
  • 4 150Go 15K SAS hard drives

That makes it a good enough platform to build a virtual lab.

Dell PowerEdge R900

For the little story, R900 actually…


Networking

OSI Layer 1&2: Ethernet

Ethernet, with Wireless LAN, is part of the IEEE 802 family of standards.
The services and protocol specified in IEEE 802 map the physical layer and data link layer of the OSI model.

Ethernet is a family of networking technologies used for wired LAN and WAN networks.

An Ethernet packet…


Book cover

Publisher description

“No single invention of the last half century has changed the way we live now as much as the Internet. Alexander Klimburg was a member of the generation for whom it was a utopian ideal turned reality: a place where ideas, information, and knowledge could be shared and new freedoms…

Xavier Briand

50% solution finder at @ExperiencePoint / 50% endurance cyclist. Will train for food and burn it for adventures.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store