Daryl Shows His Work
It just your friendly neighborhood CISSP, showing off my skills and making my contribution to the ever-growing field of "cyber education". Please watch, like, subscribe, and share! If I've done even just a little today in expanding your knowledge of cybersecurity: MISSION ACCOMPLISHED!
Project 69 - Detecting Malicious Activities w/ Snort
Project 68 - Protecting gathered Honeypot Logs w/ OpenSSL & KeePass
Project 67 - Using Iftop to Identify and Remove Indicators of Compromise in a System
Project 66 - Digital Forensic Techniques 101
Project 65 - Investigating A Cyber Attack In Progress!
Project 64 - Exploiting Client Side Vulnerabilities: Embedded Excel Macro
Project 63 - AWS CloudFormation Templates: Applying Changesets and Detecting Configuration Drift
Project 62 - AWS IAM and S3 Security Compliance Automation
Project 61 - Creating Security Groups for AWS EC2 Instances
Project 60 - Creating AWS EC2 Key Pairs and Managing Secrets with AWS Secrets Manager
Project 59 - Banner Grabbing w/ Nmap
Project 58 - Brute Forcing FTP Protocol and Exfiltrating Sensitive Information
Project 57 - Using XSS to Hijack a Browsing Session!
Project 56 - Exploiting Server Side Web Vulnerabilities w/ Gobuster!
Project 55 - Hardening A WordPress Based Web Server
Project 54 - Conducting a Man-in-the-Middle Attack w/ Burpsuite
Project 53 - Burpsuite Traffic Interception 101 🔍
Project 52 - Exploring OWASP ZAP Web Application Scanning Techniques
Project 51 - Exploiting Legacy Versions of Protocols
Project 50 - Padding Oracle and Server-Side Template Injection Attacks
Project 49 - Exploiting Broken Access Controls In A Web Application (CSRF, CORS, & JWT)
Project 48 - Configuring and Bypassing Modsecurity Web Application Firewall
Project 47 - Investigating Rogue Processes w/ Splunk
Project 46 - Reverse Engineering Malware using Cyber Chef and Yara Rules 🦠
Project 45 - Remediating Vulnerabilities Found with OpenVAS and Nessus Scanners 🔍
Project 44 - Understanding and Managing Special Permissions in Linux
Project 43 - Mastering Access Control Lists for Enhanced Security 🔒
Project 42 - Enumerating User and System Information in Linux as a Sys Admin 🖥️
Project 41 - File Permissions and the Principle of Least Privilege in System Administration
Project 40 - Searching for Persistence: Incident Response Insights