Posts

Showing posts from June, 2022

Linux Host & Network Information Gathering

Image
For this portion of my notes I will be focusing on collecting information useful for someone attempting to leverage a breached system to further their attack. Here I would be talking about some of the tools and resources that is native within a Linux system that may help scope out a scene. Additionally mentioning some tactics the attacker may use when sniffing or scanning an area with minimal detection.

Lab Examples and the Cyber Kill Chain

Image
Cybersecurity Kill Chain A model that describes stages of an attack (developed by Lockheed Martin). This model assists the red and blue team view how attacks may be deployed.

Kali Linux Fundamentals and Transforming Data

Image
  Kali Linux Fundamentals and Transforming Data Kali Linux is a form of debian linux operating system that specializes in penetration testing, digital forensics, and other forms of security research. This OS is maintained by Offensive Security, a popular security firm that develops security research materials worldwide.