How to Haunt a Computer with SSH « Null Byte :: WonderHowTo

https://null-byte.wonderhowto.com/how-to/haunt-computer-with-ssh-0199625/

Understanding Education and Certifications to Help Find Your Path in Cybersecurity – Infosecurity Magazine

https://www.infosecurity-magazine.com/opinions/education-certifications-path/

LinkedIn Spear-Phishing Campaign Targets Job Hunters | Threatpost

This is always something to look out for… https://threatpost.com/linkedin-spear-phishing-job-hunters/165240/

Setting up a RaspberryPi without monitor and keyboard – DEV Community

https://dev.to/devdevcharlie/setting-up-a-raspberrypi-without-monitor-and-keyboard-j8e

Getting Started with a home cyber lab

A home Cyber Lab is a good place to start learning Cyber Security on your own. There are hundreds of resources to be found on the web and youtube about…

Ex-NSA Hacker Explains how to get into Cyber Security

Interesting interview with an Ex-NSA Hacker. There is a lot of good information regarding degrees, certifications, CTFs, and Networking (for careers – not computers).https://www.youtube.com/watch?v=SFbV7sTSAlA

pico Information – cat photo

This one seemed easy, then turned out to be more difficult than originally thought. Most people were looking for the flag in the image properties and information. However, most people…

pico Speeds and Feeds

This is is easy to overlook even if you get the code from the hint. First step, take a look at the hint. This is where doing some research on…

pico Wireshark doo do dooo do

This one is a bit more challenging and can be tedious for those who have not used Wireshark. Download the pcap file. Open Wireshark from the C:\APPS\CTF\NETWORKING folder on your…

pico Tab Tab Attack

This required me to unzip the file. Get to the final file and use the Open With option. The program to open this is bintext app in the following folder…