Skip to content

Poves.com

Just another WordPress site

Menu
  • Infosec services
  • Sample Page

Author: gsec

Computer Architecture Basics

No Comments
| Uncategorised

These past few days I decided to take a look at perhaps my weakest topic in computer science: Computer Architecture. There is something about these abstract concepts that I have struggled to wrap my head around in the past. So once and for all, I will delve into some of the basics of computer architecture […]

Read More »

Encryption Basics

No Comments
| Uncategorised

I often find myself forgetting a lot about certain topics in cybersecurity that I have studied at some point. I recently revisited basic encryption concepts which led me down a rabbit hole this past weekend. Today’s blog post will cover what I studied; this includes symmetric encryption, asymmetric encryption, Diffie-Hellman Key Exchange, TLS Handshake, Kerberos, […]

Read More »

Quantitative Risk Analysis

No Comments
| Cybersecurity

What Is Risk Analysis? Risk analysis is a part of the risk assessment process (itself being a stage of the risk management process) which involves evaluating potential risks to determine their impact and likelihood to occur. Below I have made a list of the steps in the risk management process and some of the processes […]

Read More »

Incident Response Fundamentals

No Comments
| Uncategorised

What is Incident Response? Incident response is a set of rules and procedures that are used to identify, contain, and eliminate cybersecurity incidents. An incident is a detrimental event to the company that requires immediate prevention, containment, eradication, and remediation steps to be implemented. The 6 Phases of an IRP When an incident occurs, it […]

Read More »

Email over the Internet

No Comments
| Networks

Welcome to another post about anything somewhat related to IT. A couple of weeks ago, I was guessing recruiters’ work email addresses (a typical Friday evening hobby of course) when I received an automated email back which informed me that the recipient could not receive my email since their domain did not accept emails from […]

Read More »

VoIP

No Comments
| Networks

Today I will be talking about Voice over Internet Protocol (VoIP). I was vaguely aware of what VoIP technology was about before reading into it for this blog but a lot of this is new to me. I am going to do my best to explain what I have learnt, and why it is important. […]

Read More »

Network Basics: Hubs, switches, and routers

No Comments
| Networks

Welcome to another blog post! I have been going back over some of the basics in computer networking and I wanted to take this opportunity to make a few written pieces on what I have been (re)learning. This is primarily for two reasons. The first being that it’s a great way of reinforcing what I […]

Read More »

Mkdir: Create multiple directories with one command

No Comments
| Linux

mkdir regular syntax. mkdir -p syntax. -p = Parent directory Syntax to create a chain of child directories. Syntax to create more than one directory at a specific level. Just a fun tidbit that makes life a bit more efficient on Linux!

Read More »

Cracking Passwords

No Comments
| Pentesting

1) Check Crackstation https://crackstation.net/ It will be able to crack very simple hashes. 2) Identify Hash Type (and Salt) HashID (https://github.com/psypanda/hashID) Note: This requires Python. You can install it like so: $ pip install hashid Syntax $ python -m hashid [OPTIONS] [HASH] None of the options are necessary so I won’t write them out. Plus, […]

Read More »

Overpass 3 TryHackMe CTF Write-up

No Comments
| Pentesting

Introduction Today I will be going over Overpass 3, a moderately challenging CTF on TryHackMe. Let’s get right into it! Overpass 3 room: https://tryhackme.com/room/overpass3hosting Deploy the target machine and connect to the TryHackMe network with OpenVPN. Port Scans Let’s make a directory for this CTF and create a directory underneath that for our port scans. […]

Read More »

Posts pagination

1 2 Next

Recent Posts

  • Computer Architecture Basics
  • Encryption Basics
  • Quantitative Risk Analysis
  • Incident Response Fundamentals
  • Email over the Internet

Recent Comments

  • Dolphin on Wgel TryHackMe CTF Write-up

Archives

  • January 2024
  • December 2023
  • November 2023
  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • April 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • September 2021

Categories

  • Cybersecurity
  • Linux
  • Networks
  • Pentesting
  • Uncategorised

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Poves.com 2025 . Powered by WordPress