SSH Connect to a Kali Virtual Machine in Virtualbox

Kali is a great learning tool for learning cybersecurity, especially the red-attacking side of it. For the longest time, I had trouble running the Kali VM on my rather old Thinkpad X1 Carbon, as the image consumes quite a few resources. There is a way to use most of Kali’s tools with little resource consumption: ssh into the image via your distro terminal. It turns out it’s quite easy to set this up in VirtualBox, as described in this article: ...

January 13, 2024 · SarCoptU

Thinking About Computing Needs

After spending days trying to optimise my setup and thinking about the perfect use of my current hardware and also trying to get rid of stuff I don’t use, I came to the conclusion I need more hardware. This is kinda concerning, considering the initial problem I had before all this was that I have too much stuff around. This might have been influenced by watching The Minimalists – Less is Now or John Hammond’s video for his one laptop setup for teaching cybersecurity. ...

February 15, 2022 · SarCoptU

CompTIA Security + Study Notes: Cryptography

Cryptography is as old as the desire of humans to communicate secretly. A famous example is that of the so-called Caesar cypher, named after Julius Caesar. He used to encrypt his correspondence by shifting the letters of the alphabet to the right or left an agreed-upon number of spaces. Cypher disc Image Credit: Cypher disc By Hubert Berberich (HubiB) – Own work, Public Domain, https://commons.wikimedia.org/w/index.php ...

August 20, 2021 · SarCoptU

Network + Study Notes: Open System Interconnection (OSI) Network Model

Computers have a very particular way of communicating with each other. For example, before widespread computer networks and the internet, people shared files by “sneakernet”: wearing a comfortable pair of sneakers and putting the info on the storage media and travelling to the destination computer to copy the data. This is not a very effective way to share files, and large companies soon realised this was a huge market and started developing various network protocols. The problem was that many of these protocols were proprietary and incompatible with each other. ...

June 13, 2021 · SarCoptU