PTPortslug's Terminalinblog.portslug.com00Prt.1 – Hak5 Cloud C2 Setup on AWSNov 22, 2020 · 5 min read · What is Cloud C2? Cloud C2 makes it easy for penetration testers and IT security teams to deploy and manage Hak5 gear from a simple self-hosted cloud managed platform. Cloud C2 allows you to maintain Join discussion
PTPortslug's Terminalinblog.portslug.com00How to Install Kali on Raspberry Pi 400Nov 15, 2020 · 3 min read · In this blog, we will show you how to install and setup Kali linux on the new Raspberry Pi 400 Personal Computer. Hardware List Raspbery Pi 400 Micro SD Card PowerSupply Ethernet/Rj45 Cord MousJoin discussion
PTPortslug's Terminalinblog.portslug.com00Breaking Down Two Common Attack Techniques with CyberChefMar 31, 2020 · 5 min read · What is CyberChef? CyberChef is a simple, intuitive web application for analyzing and decoding data without having to deal with complex tools or programming languages. It is also known as the “Cyber Join discussion
PTPortslug's Terminalinblog.portslug.com00A Beginners Shodan QuestMar 13, 2020 · 5 min read · What is Shodan: Shodan is a search engine that allows researchers to explore and discover a wide range of devices that are connected to the internet, where they are located and who is using them. ShodJoin discussion
PTPortslug's Terminalinblog.portslug.com00Reducing an Organizations Email Attack SurfaceAug 15, 2019 · 3 min read · In today’s cyber landscape threats are evolving on a daily basis. There are many ways to reduce your company’s attack surface. A simple way to reduce a company’s email attack surface is by blocking Join discussion