Can Artificial Intelligence ever replace penetration testers?

Machine Learning Supervised Learning Unsupervised Learning Reinforcement Learning AlphaGo Learning from the greats Teaching itself Creativity Applications in InfoSec 1. Learning from others 2. Learning from itself Blue Team Humans vs AI Conclusion In this blog post we’ll explore if machines can fully replace pe Something to note is that predicting the future is hard and this is all entirely my opinion....

December 1, 2020 · 10 min · Bee

Learn Functional Python in 10 Minutes

In this short 10 minute article, you’ll learn what the functional paradigm is in Python. You’ll also learn about list comprehensions. 📌 Functional Paradigm In an imperative paradigm, we do things by giving the computer a sequence of tasks and then it executes them. While executing them, it can change states. For example, let’s say we set A = 5, then we change the value of A. We have variables in the sense that the value inside the variable varies....

November 30, 2020 · 14 min · Bee

Creating your own VPN with PiHole & UnBound on AWS

Introduction In this blog post we will: Create our own VPN on AWS Add PiHole to iit Use Unbound as our DNS resolver Access the VPN using Wireguard Not go bankrupt doing it! Step 1 Create an AWS lightsail instance on Amazon. We use Lightsail instead of EC2 because EC costs £0.12 / GB on outbound transfers. That means for 1 TB / month it’ll cost £120. Lightsail costs £3....

November 29, 2020 · 3 min · Bee

How I Hacked Your Pi-Hole

There are 5308 publically available Pi-Holes according to Shodan.io. This article will demonstrate how bad of an idea this is. If you’ve spent any time over at r/pihole, you’ll know they always talk about not having publically available Pi-Holes. But, why? What’s the harm? Out of the 5308 Pi-Holes publically available, I found 100 of them are vulnerable. Vulnerable means: You can access /admin/index.php?login. This is because not all Pi-Holes listed by Shodan work in the way we expect them to....

November 29, 2020 · 8 min · Bee

Introduction to IAM with AWS

Identity & Access Management Identities are required to authenticate to AWS accounts. Username = identity Password = verification Access management relates to what an identity can access once its been authenticated. The AWS IAM service is used to centrally manage and control security permissions. Users: These are objects within IAM identifying different users. Groups: These are objects that contain multiple users. Roles: These are objects that different identities can adopt to assume a new set of permissions....

November 29, 2020 · 3 min · Bee

Algorithmic Design Paradigms

Greedy Algorithms Greedy algorithms aim to make the optimal choice at that given moment. Each step it chooses the optimal choice, without knowing the future. It attempts to find the globally optimal way to solve the entire problem using this method. Why Are Greedy Algorithms Called Greedy? Algorithms are called greedy when they utilise the greedy property. The greedy property is: At that exact moment in time, what is the optimal choice to make?...

November 1, 2020 · 52 min · Bee

Favourite Books

How to Win Friends and Influence People If you talk to other humans, if you interact with humans, you must read this book. No exceptions. All my life, people told me that making friends and influencing people is an artform - something you can’t learn. This book showed me the hidden rules required to win friends. Since reading this book, every aspect of my friendships / relationships have gone up tenfold....

November 1, 2020 · 7 min · Bee

All You Need to Know About Big O Notation [Python Examples]

By the end of this article, you’ll thoroughly understand Big O notation. You’ll also know how to use it in the real world, and even the mathematics behind it! In computer science, time complexity is the computational complexity that describes the amount of time it takes to run an algorithm. Big O notation is a method for determining how fast an algorithm is. Using Big O notation, we can learn whether our algorithm is fast or slow....

October 8, 2020 · 22 min · Bee

Disaster Recovery with AWS for CCP

We’ll need to invoke our disaster recovery plans to restore our data if our storage or server fails. With traditional backup methods, the data we need might not be available because: Backup data is stored in the same location as the production data, and the disaster impacted the backups. If using a tape backup method, the tapes could fail making the data unreadable. The tapes could get lost when in transit....

October 1, 2020 · 8 min · Bee

Making Hacking Accessible

I hate the current state of hacking education, or of hacking tools. None of it is accessible to any minority. In this post, I aim to distil some guidelines for making hacking accessible. I am by no means an expert. I don’t even work in A11Y. However, I do have some wonderful friends that do — and I am passionate about this subject. Why We Need to Focus on Accessibility Basic human rights An expansion in the infosec community of new tools, new learning platforms, and new hackers SEO It is legally required....

October 1, 2020 · 20 min · Bee