SSH Connect to a Kali Virtual Machine in Virtualbox

Kali is a great learning tool for learning cybersecurity, especially the red-attacking side of it. For the longest time, I had trouble running the Kali VM on my rather old Thinkpad X1 Carbon, as the image consumes quite a few resources. There is a way to use most of Kali’s tools with little resource consumption:…… Continue reading SSH Connect to a Kali Virtual Machine in Virtualbox

CompTIA Security + Study Notes: Cryptography

Cryptography is as old as the desire of humans to communicate secretly. A famous example is that of the so-called Caesar cypher, named after Julius Caesar. He used to encrypt his correspondence by shifting the letters of the alphabet to the right or left an agreed-upon number of spaces. Cypher disc Image Credit: Cypher disc…… Continue reading CompTIA Security + Study Notes: Cryptography

Network + Study Notes: Open System Interconnection (OSI) Network Model

Computers have a very particular way of communicating with each other. For example, before widespread computer networks and the internet, people shared files by “sneakernet”: wearing a comfortable pair of sneakers and putting the info on the storage media and travelling to the destination computer to copy the data. This is not a very effective…… Continue reading Network + Study Notes: Open System Interconnection (OSI) Network Model