With the goal of teaching people about cybersecurity while having fun, Atenea is a platform where you can play while learning.
Continue ReadingFrom Zero To Hero
#FromZeroToHacker – Catching up: Networking and Linux courses
I have a completely lack of knowledge about Networking and Linux, two skills I need to step up. See how I started fixing this problem.
Continue Reading#FromZeroToHacker – A DevOps Roadmap for beginners
One of the things I have learnt in my classes is the role of DevOps, a role I haven’t considered until now. Let’s learn more about DevOps.
Continue Reading#FromZeroToHacker – Changes, and more changes
Life has changed quite a bit in the last month, and the blog is going to be reflected on those changes too. For the better (I hope).
Continue ReadingDay 083 #FromZeroToHacker – Vulnversity
We have been learning about reconnaissance, enumeration, privilege escalation, etc, but in a separate way. Let’s put together our hacking knowledge to (pretend we are) hacking a remote system.
Continue ReadingDay 082 #FromZeroToHacker – Cryptography for Dummies
Without encryption, communications would be very insecure and would be easy for a hacker to see your data. Luckily, almost all the data you send and get is encrypted and can’t be seen in plain text.
Continue ReadingDay 081 #FromZeroToHacker – Geolocating images
Geolocating images is the process of finding out the real-world location of an image. Let’s see how it is done.
Continue ReadingDay 080 #FromZeroToHacker – ffuf for beginners
ffuf stands for Fuzz Faster U Fool and it’s a tool written in Golang used for web enumeration, fuzzing, and directory brute forcing.
Continue ReadingDay 079 #FromZeroToHacker – Bash scripting for beginners
Bash is a scripting language that runs within the terminal on most Linux distros. Shell scripts are a series of bash commands, combined to achieve complex tasks that let us automate sysadmin tasks.
Continue ReadingDay 078 #FromZeroToHacker – The hacker methodology
Nessus vulnerability scanner is what it does say on the tin: A vulnerability scanner. Using techniques similar to Nmap, but presenting the information in a beautiful GUI.
Continue Reading