Understanding the network = understanding the system.
Understanding the network = understanding the system.
IP gives identity.
• IPv4 = limited
• IPv6 = scalable
• Public vs Private = reach vs isolation
↓
APIPA isn’t random.
It’s a failure signal.
No IP.
No communication.
IP gives identity.
• IPv4 = limited
• IPv6 = scalable
• Public vs Private = reach vs isolation
↓
APIPA isn’t random.
It’s a failure signal.
No IP.
No communication.
An Australian researcher scraped Waze reports to link usernames to real people.
No hacking.
Just metadata correlation.
He could infer where users lived and worked.
Waze removed the exposed usernames after disclosure.
Public data adds up fast.
An Australian researcher scraped Waze reports to link usernames to real people.
No hacking.
Just metadata correlation.
He could infer where users lived and worked.
Waze removed the exposed usernames after disclosure.
Public data adds up fast.
Logs are noise until you extract signal.
• grep, awk, pipelines → find what matters
• Shell scripts → automate, reduce errors
• Raw data → actionable info
SOC work is about turning chaos into clarity.
Automation + text-processing = operator superpowers.
Logs are noise until you extract signal.
• grep, awk, pipelines → find what matters
• Shell scripts → automate, reduce errors
• Raw data → actionable info
SOC work is about turning chaos into clarity.
Automation + text-processing = operator superpowers.
Subnetting isn’t math.
It’s organization.
• CIDR defines size
• Masks split network vs host
↓
Patterns > memorization.
Control the address space.
Control the network.
Subnetting isn’t math.
It’s organization.
• CIDR defines size
• Masks split network vs host
↓
Patterns > memorization.
Control the address space.
Control the network.
Microsoft gave the FBI BitLocker keys to unlock three laptops tied to a COVID relief fraud in Guam.
Lesson: Cloud-stored encryption keys can help law enforcement but they also reduce user privacy.
Encryption is strong, but not absolute.
Microsoft gave the FBI BitLocker keys to unlock three laptops tied to a COVID relief fraud in Guam.
Lesson: Cloud-stored encryption keys can help law enforcement but they also reduce user privacy.
Encryption is strong, but not absolute.
Agree?
Agree?
GOOD MORNING 🌞
GOOD MORNING 🌞
Networks aren’t magic.
They’re layers.
• OSI = how data should flow
• TCP/IP = how data actually flows
↓
Troubleshooting isn’t guessing.
It’s isolation.
Every issue lives at a layer.
Find the layer. Fix the problem.
Networks aren’t magic.
They’re layers.
• OSI = how data should flow
• TCP/IP = how data actually flows
↓
Troubleshooting isn’t guessing.
It’s isolation.
Every issue lives at a layer.
Find the layer. Fix the problem.
Linux isn’t static.
It’s alive.
• ps & top → see what’s running
• systemctl → control services
• Unexpected processes = investigation points
SOC work starts with knowing what should exist.
If you can’t see it, you can’t secure it.
Linux isn’t static.
It’s alive.
• ps & top → see what’s running
• systemctl → control services
• Unexpected processes = investigation points
SOC work starts with knowing what should exist.
If you can’t see it, you can’t secure it.
Accounts aren’t just names.
They’re accountability.
• Create users, manage groups → enforce least privilege
• /etc/passwd & /etc/shadow = tracking every action
• SOC work starts at the user level
Proper user & group management = foundation of secure systems.
Accounts aren’t just names.
They’re accountability.
• Create users, manage groups → enforce least privilege
• /etc/passwd & /etc/shadow = tracking every action
• SOC work starts at the user level
Proper user & group management = foundation of secure systems.
Kali = offensive security, pentesting, forensics
Ubuntu = servers, cloud, Blue Team
Ubuntu is hardened by default.
Kali assumes you know the risks.
Kali ships with 600+ tools.
Ubuntu can install them slowly.
Choose wisely.
Kali = offensive security, pentesting, forensics
Ubuntu = servers, cloud, Blue Team
Ubuntu is hardened by default.
Kali assumes you know the risks.
Kali ships with 600+ tools.
Ubuntu can install them slowly.
Choose wisely.
Starting from zero is uncomfortable.
That’s where growth starts.
• Study space + routine → consistency
• CompTIA tests understanding, not memory
• OSI & TCP/IP = troubleshooting language
Progress > perfection.
Build the fundamentals. The rest compounds.
Starting from zero is uncomfortable.
That’s where growth starts.
• Study space + routine → consistency
• CompTIA tests understanding, not memory
• OSI & TCP/IP = troubleshooting language
Progress > perfection.
Build the fundamentals. The rest compounds.
At 15, Jonathan James hacked NASA and DoD.
No exploits. Just weak security.
He panicked and turned himself in.
Avoided prison not consequences.
Curiosity has limits.
Pressure can last a lifetime.
At 15, Jonathan James hacked NASA and DoD.
No exploits. Just weak security.
He panicked and turned himself in.
Avoided prison not consequences.
Curiosity has limits.
Pressure can last a lifetime.
Permissions aren’t hurdles.
They’re defense.
• chmod & chown → enforce least privilege
• umask & SUID → subtle control points
• Ownership = risk management
SOC work starts at the filesystem level.
One bit can protect or expose everything.
Permissions aren’t hurdles.
They’re defense.
• chmod & chown → enforce least privilege
• umask & SUID → subtle control points
• Ownership = risk management
SOC work starts at the filesystem level.
One bit can protect or expose everything.
You can’t protect what you can’t locate.
You can’t protect what you can’t locate.
Most accounts aren’t “hacked.”
Access is handed over.
Fake login pages.
Cloned sites.
“Verify your account” messages.
Once creds are entered, the attacker logs in like a normal user.
No exploit. Just trust abused.
Most accounts aren’t “hacked.”
Access is handed over.
Fake login pages.
Cloned sites.
“Verify your account” messages.
Once creds are entered, the attacker logs in like a normal user.
No exploit. Just trust abused.
Barcodes aren’t random numbers.
They’re structured data for machines.
If a system reads it, trusts it, or automates around it
it can be exploited.
Security starts with understanding structure, not symbols.
Barcodes aren’t random numbers.
They’re structured data for machines.
If a system reads it, trusts it, or automates around it
it can be exploited.
Security starts with understanding structure, not symbols.
It’s the foundation of Linux, cloud, and SOC work
It’s the foundation of Linux, cloud, and SOC work
You can’t defend what you can’t see.
This platform helps security teams:
• Discover external assets
• Monitor exposure changes
• Identify attack paths early
Built for visibility-first security.
Know your surface before attackers do.
You can’t defend what you can’t see.
This platform helps security teams:
• Discover external assets
• Monitor exposure changes
• Identify attack paths early
Built for visibility-first security.
Know your surface before attackers do.
SOC work starts with discipline, not drama.
SOC work starts with discipline, not drama.
I’ve used Kali Linux for a while, so installing Ubuntu seemed easy. I failed twice rushing caused mistakes. After slowing down, setting RAM, network, and architecture properly, I finally got it working. Patience + hands-on practice = mastery.
I’ve used Kali Linux for a while, so installing Ubuntu seemed easy. I failed twice rushing caused mistakes. After slowing down, setting RAM, network, and architecture properly, I finally got it working. Patience + hands-on practice = mastery.