29 Articles in the category: Skills

Learn Pentesting Basics in One Week? – Try This Challenge - Spysafe.com.au

Learn Pentesting Basics in One Week? – Try This Challenge

To help with my Cybersecurity job search, I thought it would be interesting to see how much pentesting I can learn in a one-week period. I'll describe what I've done, starting from the basics. I'll...

Using Amazon AWS EC2 and Lucee to Host Legacy ColdFusion CFML Pages - Spysafe.com.au

Using Amazon AWS EC2 and Lucee to Host Legacy ColdFusion CFML Pages

This page describes setting up a CFML server using Lucee (compatible with Adobe ColdFusion CFML pages) on Amazon's AWS EC2 cloud computing service. I was looking for a way to host example/demo versions of some of...

What it Was Like to Use the Internet in 1991 - Spysafe.com.au

What it Was Like to Use the Internet in 1991

This page describes what it was like to use the Internet in 1991. This was before almost anyone in ordinary life had even heard of the Internet. Back then, it was almost a completely blank...

bWAPP – A Deliberately Buggy Web App to Practice Cybersecurity - Spysafe.com.au

bWAPP – A Deliberately Buggy Web App to Practice Cybersecurity

This page describes how to install bee-box, a virtual Linux installation containing bWAPP, which is a deliberately buggy web application to practice pentesting and other cyber security skills on. From the bWAPP website: ...

Introduction to the Iptables Firewall Program for Linux - Spysafe.com.au

Introduction to the Iptables Firewall Program for Linux

This page gives a quick introduction to the Iptables firewall software for Linux. More details will follow later... 1. How Iptables Works. The term “iptables” may refer to either the software firewall which is integrated...

How to Install Kali Linux On VirtualBox - Spysafe.com.au

How to Install Kali Linux On VirtualBox


Difficulty
Interest
Education
Overall

If you have a relatively modern PC or Mac, you can install Linux (e.g. Kali Linux) as a Virtual Machine. Which is in some ways like having an entire second computer, for the price of...

An Introduction to Port Scanning with Nmap - Spysafe.com.au

An Introduction to Port Scanning with Nmap

This video gives an introduction and demonstration of port scanning, using Nmap and Masscan on Kali Linux. I made the video as part of an assignment for my Cyber Security course. I'll write more...

PHP Script to Sync Between Two Different Database Servers - Spysafe.com.au

PHP Script to Sync Between Two Different Database Servers

This page gives an example of source code in PHP and MySQL which can sync individual data fields between two different MySQL database servers. I use it to update from my LOCALHOST MySQL development server to...

Massively Improve the Tone of a Mesa Boogie SOB Guitar Amp - Spysafe.com.au

Massively Improve the Tone of a Mesa Boogie SOB Guitar Amp

This page describes an electronics "mod" which I did in 2015, and discovered that it can massively improve the tone of a Mesa Boogie SOB Vintage Guitar Amplifier. SOB stands for "Son of...

How to Compile C Programs for DOS in 2021 - Spysafe.com.au

How to Compile C Programs for DOS in 2021


Difficulty
Interest
Education
Overall

This page explains the steps I used to re-compile a C program I wrote on a DOS PC in 1997, but using a modern PC in 2021. I wanted to do this so I could...

Learn How to Hack Systems By Playing the Bandit Wargame - Spysafe.com.au

Learn How to Hack Systems By Playing the Bandit Wargame


Difficulty
Interest
Education
Overall

You can play this game to learn the basics of the Unix / Linux terminal "shell" command prompt, and many other essential skills used in computer networking, including hacking. I'll write much more about this soon...

Insert Multiple Rows in Acceess in One SQL Statement - Spysafe.com.au

Insert Multiple Rows in Acceess in One SQL Statement

OK I was soooo close to giving up on this. This works in Access. (Many say its impossible, but we are learning hacking skills here right?) XD. This is the...

Using a Junction Table for a Many to Many Relation in SQL - Spysafe.com.au

Using a Junction Table for a Many to Many Relation in SQL

An associative entity is a term used in relational and entity-relationship theory. A relational database requires the implementation of a base relation (or base table) to resolve many-to-many relationships. A base relation representing this kind...

How to Use Microsoft Access from Python - Spysafe.com.au

How to Use Microsoft Access from Python

If anyone who has done 404 (or already knows some Python) is interested, this is what I did to get my Access database readable in Python. This was the first page I looked at about how...