Navigating CompTIA Certifications

CompTIA

πŸ“— Estimated Reading Time: 3 min read πŸ‘€ Author: Mr.Elliot πŸ“… Date: May 27, 2025 In the ever-evolving world of cybersecurity, having the right certifications can open doors to job opportunities, validate your skills, and boost your credibility. Among the most recognized names in IT and cybersecurity certification is CompTIAβ€”the Computing Technology Industry Association. Whether…

NIST SP 800-171, CMMC, ISO 27001, and NIS2

πŸ“— Estimated Reading Time: 6 min read πŸ‘€ Author: Mr.Elliot πŸ“… Date: May 27, 2025 In this post, we’ll break down four key frameworks that are shaping cybersecurity strategies across industries and borders: NIST SP 800-171, CMMC, ISO/IEC 27001, and the NIS2 Directive. Let’s dive into what they are, who uses them, and why they…

Networking Layers: Building Blocks of Communication

πŸ“— Estimated Reading Time: 3 min read πŸ‘€ Author: Mr.Elliot πŸ“… Date: December 16, 2024 Imagine sending a postcard to a friend across the country. You write the message, address it, and drop it in a mailbox, trusting the postal system to handle the rest. Networking layers work in a similar way, ensuring that data…

HackTheBox LinkVortex Walkthrough

πŸ“— Estimated Reading Time: 2 min read πŸ‘€ Author: Mr.Elliot πŸ“… Date: December 15, 2024 Identifying Key Vulnerabilities To tackle LinkVortex effectively, focus on identifying key vulnerabilities. Analyze network traffic, explore the web app for injection points, and check the operating system for weak configurations. Use tools like Shodan, Censys, Nmap, and Dirb for enumeration…

Understanding the Glove Stealer Malware: A Threat in Disguise

πŸ“— Estimated Reading Time: 3 min read πŸ‘€ Author: Mr.Elliot πŸ“… Date: November 17, 2024 In the ever-evolving world of cybersecurity, new threats emerge daily, targeting individuals, businesses, and governments alike. One such sophisticated malware that has been making waves in the cyber landscape is Glove Stealer. In this article, we’ll explore what Glove Stealer…

HackTheBox – SEA Walkthrough

SEA

πŸ“— Estimated Reading Time: 1 min read πŸ‘€ Author: Mr.Elliot πŸ“… Date: November 13, 2024 Enumeration SEA is an easy Linux machine. I will show here a step by step walkthrough on how to pwn this box. 2. Run an Nmap scan on the target machine. The results of the nmap scan shows that it…

Install a Kali Linux into a USB thumbdrive

πŸ“— Estimated Reading Time: 3 min read πŸ‘€ Author: Mr.Elliot πŸ“… Date: November 5, 2024 Sometimes we just want to have or bring along a Kali Linux in our pocket. It is possible using a USB thumbrive or pendrive. Follow these steps and you will have your Kali Linux in a pocket.Here’s a step-by-step guide…

ChatGPT- AI Ally Against Modern Threats.

πŸ“— Estimated Reading Time: 5 min read πŸ‘€ Author: Mr.Elliot πŸ“… Date: November 4, 2024 Introduction In today’s fast-paced cybersecurity world, keeping up with emerging threats and challenges can feel overwhelming. ChatGPT, an AI language model created by OpenAI, is here to help. Beyond just answering questions, ChatGPT assists cybersecurity professionals with everything from writing…

Linux Privilege Escalation with Linpeas

Linpeas

πŸ“— Estimated Reading Time: 4 min read πŸ‘€ Author: Mr.Elliot πŸ“… Date: November 3, 2024 Understanding Linux Privilege Escalation In Linux, root privileges are like holding the master key, granting the ability to perform any actionβ€”from reading and modifying any file to installing software and managing system settings. However, this level of access is not…

Flipper Zero: Power in Pocket

Flipper Zero

πŸ“— Estimated Reading Time: 3 min read πŸ‘€ Author: Mr.Elliot πŸ“… Date: November 2, 2024 What is Flipper Zero? Flipper Zero is a small, handheld device with an intuitive user interface, a monochrome screen, and a playful design. While it looks like a toy, it packs a suite of powerful tools for wireless communication, signal…