Fact: Nearly all internet connected devices will be port-scanned at some point in their lifespans. You want to know what most of the largest breaches of a decade or more have in common? Open, listening ports! Yes, you read that right. The bad guys scan for open, listening ports. Cybercriminals have relied on port scan … Continue reading Silence is golden. Close those ports, with SSHepherd.
Tag: protocols
Cyber Security Learning Path.
Hey guys, I know it’s been a while and I’m really sorry about that. This year threw me off kilter and I was having difficulties finding my drive and energy but I seem to be getting it back. Thanks for being patient with me. Alright, so a lot of people have been reaching out to … Continue reading Cyber Security Learning Path.
Introduction to Linux. (Part 1)
Setting up Virtual Machine. I decided to use VMWare workstation player, after only ever using virtual box.Google your choice of VM (in my case workstation player 15), download and install (follow the installation process) Google Kali Linux download and search through the results for, custom image by Offensive security, download appropriate image for VM.Download 7zip, … Continue reading Introduction to Linux. (Part 1)