cyberjourney.euImportance of IoT security. RFID world.Intro IoT nowadays is everywhere. Now there’s about 20 billion IoT devices. In 2031 there will be around 35 billion IoT devices connected to the internet. Interesting information about IoT devices & other stuff When more network devices we have and m...Jan 9·6 min read
cyberjourney.euHome Lab IntroductionIntro When I was learning cybersecurity topics in the past year, I’ve grasped lots of different tools and techniques. Some of the most iconic for me were: CAN BUS (controller area network) Radio Frequency Cryptography I was lucky to have an oppo...Dec 20, 2025·3 min read
cyberjourney.euHTB CPTS: Study Sessin (NMAP - output, scripts, performance, timeouts)What is Enumeration? It is one of the most important parts of Penetration Testing process. It is identifying all of the ways we could attack a target. We must do our best in this phase. Long story short - enumeration is collecting as much information...Nov 15, 2025·7 min read
cyberjourney.euHTB CPTS: Study session (Transferring files, Knowledge sources, Vulnerable Machines and apps, Reverse shell)Transferring files During any penetration testing exercise, it is likely that we will need to transfer files to the remote server. There are few options for this: One method is running a Python HTTP server on our machine and then using wget or cUR...Oct 20, 2025·4 min read
cyberjourney.euHTB CPTS: Study session (Privilege Escalation, Enumeration)Privilege Escalation Once we gain initial access to a box, we want to thoroughly enumerate the box to find any potential vulnerabilities we can exploit to achieve a higher privilege level. There are checklists for privilege escalation online. A goo...Oct 15, 2025·2 min read