Hacking Live Stream: Episode 2 – HackTheBox Active, Vulnserver Buffer Overflow, and Career Q&A / AMA

In this video, we cover common Active Directory attacks, including GPP/cPasswords and Kerberoasting against Hack the Box’s Active. We also cover basic buffer overflows with Vulnserver. We conclude with career Q&A. If you enjoy this video, please follow me on Twitch (https://www.twitch.tv/thecybermentor) for future lessons! Wanna chat? Add me on Twitter, YouTube or LinkedIn!Veteran? Join

Continue reading

Hacking Live Stream: Episode 1 – Kioptrix Level 1, Hack The Box’s Jerry, and Career Q&A / AMA

In this video, we cover vulnerable machines from a penetration tester’s perspective. Instead of just capturing the flag, we cover what vulnerabilities potentially exist and would be noted on a penetration testing report. We conclude with career Q&A. If you enjoy this video, please follow me on Twitch (https://www.twitch.tv/thecybermentor) for future lessons! Wanna chat? Add

Continue reading

My eLearnSecurity Experience: Part 1 – WAPT

Introduction Around a month ago, I was looking for my next “hacking” certification. Up to this point, I’ve achieved the CEH, OSCP, OSWP, and Pentest+ (beta), in that order. I was specifically looking for web application, reverse engineering, and advanced penetration testing certifications that were relatively up to date as I felt that I needed

Continue reading

Review: SANS VetSuccess Academy

Introduction Cybersecurity is a growing field in high demand; however, many estimates predict a shortage of approximately 3.5 million qualified cybersecurity candidates by 2021. This shortage is leaving many companies vulnerable to data breaches, ransomware, and other cyber-attacks.  To address this shortage, the SANS Institute offers a program to help fill the impending cybersecurity skills

Continue reading

x86 Exploit Development Pt 1 – Intro to Computer Organization and x86 Instruction Set Architecture Fundamentals

Hey guys! I figured that it would be beneficial to have an entire post dedicated to teaching some fundamentals about Computer Organization and the x86 Instruction Set Architecture, since I will be referencing this particular ISA (instruction set architecture) throughout most of my tutorials on Exploit Development and Reverse Engineering. This will be updated over

Continue reading