• Skip to main navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Hacking & CTF
  • SysAd and SecuritySystems Administration (SysAd) and Digital Security are two huge categories that are both hugely important in the modern world. SysAd ranges from compiling modules, configuring Apache webserver, updating servers and networking remote computers. Digital security, one of the most interesting aspects of the digital world, will see topics for everything from configuring firewalls, detecting security breaches, handling exploits, calculating risk and detecting threat vectors. I’m hugely interested in SysAd and security, as I see them both as critical aspects of entire businesses. Both SysAd and Security Individuals are in a constant arms race with malicious users and automated bot nets. As new tools to protect servers and systems are produced and rolled out, new ways to circumvent them are developed. As hackers find new ways to breach systems and services, security aficionados and clued up  system administrators patch, program and research their ways back to securer grounds.
  • Linux
  • Raspberry Pi
  • Programming
  • Contact Me & Privacy Policy
  • Skip to menu toggle button

Coder, Hacker, SysAd & Forensic Investigator

A blog from a forensic investigator, ethical hacker and programmer

Tag: network

The network category covers a huge plethora of topics; from the OSI 7 model, IP and CIDR formats, down to scanning host machines, port scanning and denial of service attacks. Where possible I’ve also tagged networking categorised articles into various protocols, such as the main Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP). Equally some articles will be tagged for which layer of the Open Systems Interconnection 7 model they belong to; application, presentation, session, transport, network, data link or physical.

Reverse Shell Stabilisation

Below is one example of how to stabilise a reverse-shell. What are the benefits of a reverse-shell: Makes using text…
Continue reading “Reverse Shell Stabilisation”…
Posted on: January 27, 2022 Last updated on: January 27, 2022 Comments: 0 Written by: Paul Joyce

AoC3#13: They Lost The Plan!

Today’s CTF challenge in TryHackMe’s Advent of Cyber is all about privilege escalation on a Window’s box. After a bit…
Continue reading “AoC3#13: They Lost The Plan!”…
Posted on: December 28, 2021 Last updated on: February 7, 2022 Comments: 0 Written by: Paul Joyce

AoC3#12: Sharing Without Caring CTF

Continuing on with our TryHackMe challenge, we’re now onto Day 12 – Sharing without Caring. This CTF challenge sees us…
Continue reading “AoC3#12: Sharing Without Caring CTF”…
Posted on: December 28, 2021 Last updated on: February 7, 2022 Comments: 0 Written by: Paul Joyce

AoC3#11: Where Are The Reindeers

I’m now 46% of the way through the Advent of Cyber challenge, hosted by TryHackMe for December 2021. This writeup…
Continue reading “AoC3#11: Where Are The Reindeers”…
Posted on: December 20, 2021 Last updated on: February 7, 2022 Comments: 0 Written by: Paul Joyce

AoC3#10: Offensive Is The Best Defence

The tenth day of this TryHackMe hosted Advent of Cyber see’s us tackling a network challenge – Offensive Is The…
Continue reading “AoC3#10: Offensive Is The Best Defence”…
Posted on: December 20, 2021 Last updated on: February 7, 2022 Comments: 0 Written by: Paul Joyce

Rev-shell & Netcat file transfer

Recently I was completing the TryHackMe bookshop CTF room and found myself on a very unstable reverse-shell. I couldn’t even…
Continue reading “Rev-shell & Netcat file transfer”…
Posted on: December 16, 2021 Last updated on: January 27, 2022 Comments: 0 Written by: Paul Joyce

AoC3#09: Where Is All This Data Going

Today I continued our little adventure into the Advent of Cyber challenge on TryHackMe. Day 9, Where Is All This…
Continue reading “AoC3#09: Where Is All This Data Going”…
Posted on: December 14, 2021 Last updated on: February 7, 2022 Comments: 0 Written by: Paul Joyce

What is a UDP Flood Attack (DoS)

A User Datagram Protocol flood attack is a type of denial of service attack (DoS) which relies on the basis…
Continue reading “What is a UDP Flood Attack (DoS)”…
Posted on: April 5, 2016 Last updated on: January 18, 2022 Comments: 1 Written by: Paul Joyce

How to do Port Scanning with Nmap

Network Mapper, usually just known as Nmap, is a powerful yet compact tool to have in your arsenal, giving you…
Continue reading “How to do Port Scanning with Nmap”…
Posted on: April 1, 2016 Last updated on: January 18, 2022 Comments: 1 Written by: Paul Joyce

How to remember the OSI 7 model in order

Remembering the OSI 7 Model – Mnemonics The order that the different layers of the Open Systems Interconnection 7 model…
Continue reading “How to remember the OSI 7 model in order”…
Posted on: February 1, 2016 Last updated on: January 7, 2022 Comments: 0 Written by: Paul Joyce
1 2 Next page »

Recent Posts

  • Reverse Shell Stabilisation
    Below is one example of how to stabilise a reverse-shell. What are the benefits of a reverse-shell: Makes using text…
    Continue reading “Reverse Shell Stabilisation”…
  • log4j Exploit – Solar CTF
    Last year, CVE-2021-44228 was discovered and it rocked the IT world. The vulnerability was found in logging software, log4j, and…
    Continue reading “log4j Exploit – Solar CTF”…
  • THM – Revenge CTF Room
    Todays Capture the Flag hacking writeup is for the TryHackMe room, Revenge. It’s a medium rated room with the following…
    Continue reading “THM – Revenge CTF Room”…
  • AoC3#19: Something Phishy Is Going On
    With the completion of the last 18 days worth of Advent of Cyber challenges, I’m now starting on the blue-teaming…
    Continue reading “AoC3#19: Something Phishy Is Going On”…
  • AoC3#18: Playing With Containers
    Our first half of the cloud challenges saw us meddling with Amazon’s AWS buckets and the AWSCLI. I found that…
    Continue reading “AoC3#18: Playing With Containers”…

Posts Tags

Advent of Cyber 2021 chrome cli CSS ddos dos facebook filezilla ftp Hacking Challenge Writeup IDOR Exploit IE IE6-7 IE8 IE9 JohnTheRipper jQuery LESS linux linux mint netcat network nmap oneiric ocelot PicoCTF precise pangolin Privilege Escalation Python rant Raspberry Pi RCE - Remote Code Execution reverse shell security SQL Injection SSH sysad thunderbird TryHackMe ubuntu webdev Web Exploitation wifi windows Windows Box Exploitation wordpress

Recent Posts

  • Reverse Shell Stabilisation
    Below is one example of how to stabilise a reverse-shell. What are the benefits of a reverse-shell: Makes using text…
    Continue reading “Reverse Shell Stabilisation”…
  • log4j Exploit – Solar CTF
    Last year, CVE-2021-44228 was discovered and it rocked the IT world. The vulnerability was found in logging software, log4j, and…
    Continue reading “log4j Exploit – Solar CTF”…
  • THM – Revenge CTF Room
    Todays Capture the Flag hacking writeup is for the TryHackMe room, Revenge. It’s a medium rated room with the following…
    Continue reading “THM – Revenge CTF Room”…
  • AoC3#19: Something Phishy Is Going On
    With the completion of the last 18 days worth of Advent of Cyber challenges, I’m now starting on the blue-teaming…
    Continue reading “AoC3#19: Something Phishy Is Going On”…
  • AoC3#18: Playing With Containers
    Our first half of the cloud challenges saw us meddling with Amazon’s AWS buckets and the AWSCLI. I found that…
    Continue reading “AoC3#18: Playing With Containers”…

Top Posts

  • [Fixed] Dreamweaver FTP Error: Timeout 'Waiting for Server'
  • Facebook's confirmation code too long? [Fix]

My Site = My Rules!

Similar to if you were in my house, this is my site and my rules. If you don't like what you read or see on here then you are more than free to leave and explore the many wonders of the virtual world.

Conversely just because somethings on my site doesn't necessary mean I wrote it, or believe it, or agree with it. Regardless if its got my name above, below or signed straight through the middle of it.

Also I may change this site at any time.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy