Joshua Cole
Joshua Cole's Blog

Joshua Cole's Blog

Follow
homeCyber Security 101How things workBeginnersQuest - Google CTF 2021badgesnewsletter
Tag

#cybersecurity

#cybersecurity-1

More content

Read more stories on Hashnode


Articles with this tag

Making a $2 BadUSB (USB Rubber Ducky)

Sep 17, 20223 min read

What is a BadUSB? A BadUSB is a USB device that acts as a keyboard and injects preprogrammed keystrokes into a computer. A BadUSB is Indistinguishable...

Making a $2 BadUSB (USB Rubber Ducky)

What is the Diffie–Hellman key exchange?

Aug 28, 20225 min read

The Diffie-Hellman key exchange is a private-public key (asymmetrical) encryption used to establish a shared secret key. When using a symmetrical...

What is the Diffie–Hellman key exchange?

What is Symmetric Encryption?

Jul 29, 20225 min read

Symmetric Encryption explained by a basic Python implementation of a Stream Cipher · What is Symmetric Encryption? Symmetric encryption is a type of...

What is Symmetric Encryption?

The basics of Metasploit

Jun 13, 20229 min read

What is Metasploit Metasploit is a powerful exploitation framework full of premade exploits and payloads. It is a powerful tool that can support you...

The basics of Metasploit

How to crack hashes with John the Ripper

Jun 11, 20224 min read

John the Ripper is one of the most loved and versatile hash password-cracking tools out their. It combines speed, ease of use and reliability. But...

How to crack hashes with John the Ripper