Skip to main content

100 Reps

Why CyberSec?


Warfare is progressively moving more and more into the digital space.

Whether we like it or not, civilian businesses sustain collateral damage as foreign powers try to take each other down by disrupting assets to the other country.

This might be healthcare, traffic networks, power grid.

Even non-essential companies like accounting firms and SMEs risk:

  • Ransomware attacks which provide funding
  • Data exfiltration which provide login credentials
  • DOS attacks to critical services

I've only added a couple of example links, but the attacks happen so regularly that it's almost commonplace.

Not Yet a Boom

We've seen a crypto boom.
At present, we are in an AI boom.
Cybersecurity has not yet had mass focus.
I want to be ready for when it does.


Popular posts from this blog

PicoCTF: Low Level Binary Intro Playlist

Mochi's Tale Mochi's Tale is a really cool little game that teaches you how to "find things out" through experimentation. I found it a really helpful way to get you into the rhythm of learning rules without being told what they are in the first place.

Linux Admin: Managing Users

I read through Chapter 2 of Linux Admin for Absolute Beginners by Martin Stevenson Key Learnings: Add Users Passwords User groups How to add users The flags of adduser varies across different version of Linux, so consult the man pages for more info. I am practising on Kali Linux, the simplest command is: sudo adduser --comment "Gym Owner Terry Crews" tcrews You will need root access for this. So using the root user or adding sudo will work. Sometimes you'll see another command useradd instead. The recommendation is to always use adduser. adduser is a wrapper for useradd.  adduser is more user friendly and interactive than its back-end useradd . There's no difference in features provided. Why is this important? This is how we can create an account for users to access Linux servers. If you have a new employee at your company or student who enters the university, they'll need access to the shared drive, a private drive for themselves etc. Groups Groups keep users i

PicoCTF: The Debugger

GDB baby step 1  Can you figure out what is in the eax register at the end of the main function?  For Mac, gdb can be installed via homebrew: brew install gdbGDB baby step 2 Learn how to disassemble a program from binary file. Here we can see that in line 15, 0x86342 is copied into eax. The output here seems to reverse the arguments.