As a recruiter, I often have the question posed to me in a variety of ways, “Exactly what is it that hiring managers want?” What is it that they are looking for when they review resumes and interview candidates?
Conceptually, screening candidates for best fit is a simple thing. If […]
The sharp short sound of a black agent hibernating his Laptop’s OS echoed in the room. The box banged shut making the screen and the keypad kiss each other. The RJ-45 was still soldered to his eth0 but he didn’t care and cut the wires using a M9 bayonet […]
Our 7-Day CISSP training course is the best things you can do to prepare yourself to pass the CISSP exam.
The bootcamp style course lasts for 7 days, with 12 hours of training each day. It culminates with a final practice test that mimics that actual exam. On the last […]
Some Random Number concepts:
“Random numbers” means numbers which are random in practice (i.e. unpredictable and non – reproducible). As simple this term looks when you hear it for the first time, it is more difficult to reproduce. It is a bit different when we talk about single random numbers […]
Anonymous is the most famous ‘hacktivist’ group in the world. The informal nature of the group makes its mechanics difficult to define. Subsequently, without a formal organizational hierarchy, it’s difficult to explain Anonymous to the general public and the media. In this article, I’ll explain the history of the […]
Communications around the world are gradually going digital.
I was born in 1984. I would expect, if I entered a typical office workplace that year, to find various filing cabinets, stacks of paper letters, memos and invoices, and typewriters. Even the state-of-the-art electronic typewriters of that day, such as the […]
tree > directory.txt (creates a directory tree of the current directory in a text file named directory.txt)
tree /F > directory.txt (creates a directory tree plus all files and extensions of the current directory in a text file named directory.txt)
use && between command to do multiple commands at once. (string commands together)
tasklist | […]
The grep utility, which allows files to be searched for strings of words, uses a syntax similar to the regular expression syntax of the vi, ex, ed, and sed editors. grep comes in three flavors, grep, fgrep, and egrep, all of which I’ll cover in this article.
The name grep is derived from the editor […]
echo 1 > /proc/sys/net/ipv4/ip_forward enables ipv4 forwarding on backtrack, and other distros.
cut -d” ” -f2 > new (cuts from an nmap grepable scan file and leave only ip. the grep file looks like this;
Host: 192.168.0.1 () Ports: 139/open/tcp//netbios-ssn///
Host: 192.168.0.3 () Ports: 139/open/tcp//netbios-ssn///
we’re using a delimiter of space -d” ” and […]
Description: A bug in Chinese video streaming software leads to mass open proxies on the web.
A security blogger has uncoverd a flaw in the Chinese PPLive video streaming software. A new port, TCP port 9415, was appearing regularly on websites that list open proxies. Most of these open proxies were based […]
In the comments to an earlier article, Ideal Skill Set For the Penetration Testing, a reader, Nicole, asked, “Does anyone have any suggestions on where I should start building practical skills?” I originally wrote this as an answer to her comment. But it’s a question I get a lot […]