<aside> 📌 Table of content
</aside>
https://drive.google.com/file/d/1tE9-yyPzciy6dzSb0qwJbTzQmo1706zR/view?usp=share_link
ssh -o "UserKnownHostsFile=/dev/null" -o "StrictHostKeyChecking=no" [email protected]
To find a file
sudo updatedb
locate pen200.ovpn
As a general rule, the only reason why hacking a machine takes any time at all is because there are things about it that we don't know. In a majority of cases, if we knew everything there was to know about a specific target ahead of time, then we would already know the precise few commands or lines of code necessary to compromise it.
Those are mainly definitions of each penetration test steps, look on the pdf if needed.
This part is as the name says an introduction to cybersecurity. It gives nice bases of cybersecurity. I should make a summary of it after taking the actual exam.
We can take this analogy further to include compliance and risk management aspects of security. At some point, Bob accepts the risk that may steal bananas and decides to get insurance. But his banana insurance won't pay for stolen bananas unless he complies with their requirements for risk mitigation, which entail having a sturdy wall and guard dog.
⇒ Good example to explain GRC