An Overview of the Cyber Kill Chain

Kill chain was originally a term used by the US Military to formally identify the steps involved to neutralise a target. There are a few different models of the kill chain but one of the original military ones is Find, Fix, Track, Target, Engage and finally Assess. The cyber kill chain is an attempt to…

Vault 8

Shortly before the weekend Wikileaks published Vault 8, their analysis and the source code they used as part of their Vault 7 leaks that document how the CIA execute their cyber offence strategy. As the days go by and more people are given a chance to analyse and review the source code contained as part…

Setting Up

As a template I’ve been following Penetration Testing: A Hands-On introduction to Hacking by Georgia Weidman, so have been attempting to install the tools mentioned in the book. The major one being Kali Linux. Pairing this with the free Virtual Box on my MacBook Air is a great way of still being able to use macOS and all…

First

For a few weeks I’ve been focusing on improving my skills within the field of penetration testing and after getting some advice, it was recommend I started my own blog to document what I’m doing and also to share some of the challenges I’m having. As time goes on I intend for this blog to…