Max KHack The Box | Legacy — WriteupHere is my the very first hacking writeup. And the first machine is Legacy — retired, but pretty useful for novice. This machine was…Dec 31, 2019Dec 31, 2019
Brandon DixonExperience Series: LegalThis post is part of my Experience Series where I share opinions I have formed from building companies and running product. Each posting…Dec 31, 2019Dec 31, 2019
ChrisWHeuristics and Biases made when ForecastingThis is obviously not financial advise. This is a theory based academic exercise looking at basis and how they may effect the thinking of…Dec 31, 2019Dec 31, 2019
Chetan ConikeeState of CyberSecurity : 2020 perspectiveIn information security, organizations may both feel secure when they are not, and insecure when they are actually secure given that this…Dec 31, 2019Dec 31, 2019
Kasun ChathurangaSri Lankan Website Security in 2019 — The Good, The Bad and The UglyThe year 2020 is in the dawn with new hopes with the start of a new decade. This is a small look back on the websites from the perspective…Dec 31, 2019Dec 31, 2019
Ryan KoinThe StartupHow do I get started on a cybersecurity career?Throughout my career as a cybersecurity professor, I often get questions about starting a career in cybersecurity. This question seems…Dec 31, 20191Dec 31, 20191
Ismail TasdeleninKodcularSubdomain Detection — Aquatone Tool Installation and UsageBu yazıda aquatone aracını ele alacağım. Aquatone oaracı çok yönlü bir araçtır.Dec 31, 2019Dec 31, 2019
Matt JohnsonHackTheBox: Beep WalkthroughI finally got around to doing another HackTheBox machine, and this was surely an interesting one. The machine is Beep. We’re given an IP…Dec 31, 2019Dec 31, 2019