Image for post
Image for post

This has been a really trying year for many people, including myself, and beginning next Saturday, I will start preparing for a long awaited attempt at one of the more difficult certification goals I have wanted to embark on for a while now…the OSCP. The pre-preparation anxiety is already in full swing, and I have had to come to terms with a lot of harsh realities these past few years I wasn’t really mentally prepared for.

Between the loss of my father’s business, the COVID diagnosis my mother received, a layoff, and my 16 year old brother-in-law almost dying in a car accident, things have been nothing short of brutal on my end. …


Image for post
Image for post

With recent winter storms, seeing a machine titled after an ice sport peaked my interest, so I used it as an opener for my first write-up. Curling is a game where granite stones are slid across ice for score accumulation, and curlers try to find ideal paths, which is partly why the game has been given the moniker chess on ice.

I started off by making a curling folder and added my scan results for organization and analysis later: mkdir curling; cd curling; nmap -sC -sV -oN curling.txt 10.10.10.150

Nmap tells us Joomla! is used and ssh is open, which is a nice sign because content management systems are well-known for having issues, coupled with ssh possibly being used to our advantage. I also usually check websites to view page source and dig for clues, and after looking up documentation on Joomla! found that /administrator is the default login panel for this particular CMS. If you look at the main page, you'll notice the "..first curling in 2018!" post was written by a user named Floris, which may be a clue. …


Image for post
Image for post

Many of us remember playing telephone and learning about attaching cans to a string and speaking through them as kids. That’s what’s known as the lover’s phone and was created sometime in the 16th century by a guy named Robert Hooke. The next 200 years or so became wrought with individuals working on similar telephony ideas, so history is less clear on the actual inventor of the phone and holds a debate on “who did it first”. …


Image for post
Image for post

In part 1 of my recaps, I touched up on core foundations for CCNA 1, to clear up misconceptions new readers may face. This section however, is probably the harshest portion of material to digest, primarily because of the dense capacity combined with routing protocols and subnetting. So here goes round two of my condensed notes to help solidify some ground here. If you would like to view the raw compilation I’ve written, please feel free to check out my repo.

Each section is separated by a divider, so feel free to skip around.

The first portion of material contains fluff about purchasing decisions which I’m going to gloss over, but whenever you see the term ingress in reference to ports, think of the word “in” because it’s a reference to where frames enter a port, with the adverse being true for the term egress (“out”). Things start to get interesting when we discuss Content Addressable Tables, not solely because of attacks, but because it’s how switches know which ports to send frames to. Switches have to learn about the devices on each port, and in order to do so they build a special table from populated MAC addresses that forwards frames out of ALL ports when incoming frames aren’t found within. So basically, a switch receives a frame on a certain port, examines the MAC address it’s coming from and runs a comparison with what’s in the table. If it finds an address, it resets an aging timer and records information. …


Image for post
Image for post

Learning about networks can feel like a frustrating and daunting task, so I wrote a condensed version of my notes that covers some ground over what transpires across the wire. If you would like to view the raw compilation I’ve written, please feel free to check out my repo.

This post will discuss layers from the ground up.
Each section is separated by a divider, so feel free to skip around.

The Open Systems Interconnection model (OSI model), was a system devised in the 1970’s in order to help categorize the communicative functions happening at each layer of its design, to give readers a basic understanding of the networking realm. These layers from the bottom up are as follows: Physical, Data Link, Network, Transport, Session, Presentation and Application, but I find that the mnemonic “Please Do Not Teach Students Pointless Acronyms” works just as well when trying to remember this. …


As a parent and avid tech enthusiast, I often find myself in an awkward dilemma when it comes to my children and have discovered that I am not alone when I ask:

How do I not only inspire, but find resources to foster the inquisitiveness prevalent in hack culture for my children and how do I do so on a budget?

Over time, I have picked up a few tricks and learned some do’s and don’ts when it comes to the subject.

First and foremost, don’t be afraid to get your hands dirty! You want to encourage active learning by being a part of the process. You may end up pleasantly surprised to find out that your children may be more well-grounded in certain subjects then you expect and they may even teach YOU in response. This type of interaction is extremely important to have with children, so don’t be afraid to troubleshoot problems together, do research and build something new. …

About

piratemoo

Breaker of things. Too grey for smiles, too blue for tears, too red for redemption.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store