Cyber Articles

Greetings humans and welcome to my first attempt at producing a website.

Please Select from the post index below to navigate:

ARTICLES COLLECTION

SOC - 101

Introduction to the field and identification of suspicious events

SEE MORE

THE REGISTRY

A Windows settings database

SEE MORE

WINDOWS TERMINOLOGY 101

Sessions, Processes, Services, etc.

SEE MORE

CYBERATTACKS ARTICLE #1

About Mimi Katz, weaponizing powershell & Linux local privilege escalation

SEE MORE

DOM XSS

An XSS Attack that primarily targets the client side

SEE MORE

IPTABLES

The Linux OS firewall

SEE MORE

NETWORKING 101

Networking-Basics

SEE MORE

REVERSE-ENGINEERING

An introduction to reverse engineering

SEE MORE

IDRAC +ESXI SETUP

Installation of IDRAC controller + ESXi hypervisor on bare metal

SEE MORE

REVERSE-ENGINEERING 2

A second part about reverse engineering

SEE MORE