SSH Connect to a Kali Virtual Machine in Virtualbox

Kali is a great learning tool for learning cybersecurity, especially the red-attacking side of it. For the longest time, I had trouble running the Kali VM on my rather old Thinkpad X1 Carbon, as the image consumes quite a few resources. There is a way to use most of Kali’s tools with little resource consumption:…… Continue reading SSH Connect to a Kali Virtual Machine in Virtualbox

CompTIA Security + Study Notes: Cryptography

Cryptography is as old as the desire of humans to communicate secretly. A famous example is that of the so-called Caesar cypher, named after Julius Caesar. He used to encrypt his correspondence by shifting the letters of the alphabet to the right or left an agreed-upon number of spaces. Cypher disc Image Credit: Cypher disc…… Continue reading CompTIA Security + Study Notes: Cryptography