The phrase “Command and Control (C2)”, which has its origins in military terminology, refers to the approach an attacker uses to take command of and exercise control over a compromised system. In t...
Routing Traffic Between Windows and Linux
I recently had a situation where I needed to exploit a Windows service but I wanted to catch the reverse shell on my Kali machine. Obviously proxychains or the like could help, but I was already co...
New Note-Taking Tools
Since the start of the new year, I’ve been looking for better tooling to improve the way that I conduct my daily tasks. This has taken me through a journey ranging from Time Management to Motivatio...
Can you Motivate the Unmotivated?
In a workplace – as with in life, it is likely that you will come across individuals who are unmotivated, sometimes that individual is you. I’ve experienced this several times and most people I kno...
Time Management
“Time management” refers to the way that a person organises and plans how long they spend on specific activities. It may seem counter-intuitive to dedicate time to learning about time management an...
2020: A Year in Review
During lockdown I decided to start this blog and I have to say, my interest in writing these posts waxes and wanes, but every now and then I add in new concept or have these sparks of energy and my...
Seasons Greetings
Hi everyone, I would like to wish you the best for the holiday season! 2020 has definitely had its ups and downs – I will definitely be doing a year in review at the start of next year but as a q...
Creating a Challenge VM
I have always been a fan of virtual machine hacking challenges (Challenge VMs / Boot2Roots) and what you can learn while solving them. However, after completing a bunch of them, I was curious about...