Journal
Research, reflections, and applied security practice. Notes from the console.
pnpt
<h1>Error: Invalid Frontmatter</h1>
<p>Path: <code>/home/u374180119/domains/zer0space.me/public_html/user/pages/03.journal/07.pnpt/item.md</code></p>
<p><strong>Failed to read /home/u374180119/domains/zer0</strong>...</p>
Python for Absolute Begginers
<h1>Introduction</h1>
<p>So you want to learn Python. You’ve come to the right place.</p>
<p>Python is widely regarded as one of the most beginner-friendly programming languages in the...</p>
Cross-Site Scripting
<p>When I was in college around ’08 – ’09, I stumbled my way into becoming a freelance web designer. Like most millennials, I learned the basics of coding largely through My...</p>
AD
enumeration
Pivoting, Tunneling, and Port Forwarding
<p>PIVOTING</p>
<p>Every device that communicates with/across a network needs an IP Address. Usually this is done automatically via DHCP server, but it is possible to statically...</p>
AD
enumeration
Networking Protocols & the OSI Model
<p>OSI Model of Networking</p>
<p>The OSI (Open Systems Interconnection) model is a framework that explains how different systems communicate over a network. It was developed by...</p>
AD
enumeration
Ethical Hacker Methodology
<p>Ethical hacking, also known as penetration testing, is a controlled simulation of a cybersecurity attack with the intent of identifying weaknesses in a client’s network s...</p>
AD
enumeration