My Last Post on This Domain

OK guys,

I think that it is time for me to publish the last post on this blog using WordPress as a domain. As you probably already know, GitHub is my favorite company and I have decided to switch my blog to a completely new domain.

I have published a couple of posts exclusively on the new domain and backed up every post from this domain to my new address (with one exception, but I’m working on it). I feel confident now to make the switch and I started to feel really comfortable using GitHub + Jekyll as a blogging platform, so I’ve decided to drop by and say good bye to my old domain.

From now on, you can follow me on r3bl.github.io. Be sure to use the http version of the site because https version is currently not properly implemented in the code. If you run into some issue while browsing the site or you miss a feature that I had implemented on this domain, feel free to report it here.

As always, you’re more than welcome to contact me anytime on aleksandar.todorovic@mail.ru. I hope that you’ll continue to read me on my new address.

Sincerely,
Aleksandar Todorović

Advertisements

Notes on Build Your Own Cyber Lab at Home Course

Recently I finished a free course offered Cyber Security School Online on Udemy called Build Your Own Cyber Lab from Home.

What I want to do now is to share the notes I’ve written while taking the course. The courses are divided into a couple of cathegories and they’re written for my current knowledge and situation, but I hope that there will be a person out there that will find them useful.

Here are the links to .odt version and .pdf version.

[NinjaSec Course] Organizing information during PenTest

So, I found about this great tool for organizing notes while you do the penetration testing.

It’s basically a simple note-taking app called Dradis specifically designed to be used in penetration testing purposes. It’s open source, written in Ruby and runs straight in your browser.

Everything you write down for a project will be password encrypted and stored in a SQLite database.

It does not have text formatting option, so you can’t really rely on your notes to look pretty, but it has an option of importing data from some of the most known intelligence gathering applications.

Although I was impressed that there is a tool specifically designed for using for penetration testing purposes, it’s not something I will be using. Although I’m actively searching for a good Evernote alternative (I do not feel comfortable storing my notes on their server and I’m not comfortable that my notes are not encrypted on my hard drive), I got kinda used to using it, so I will be using Evernote at least for a while, while I’m still trying to find some good alternative that has my privacy as their main goal, but can also sync my notes on both of my systems (Windows 8.1 and elementary OS of course).

Starting an Ethical Hacking Course

So, I found out about a personal blog about network security and while reading it I found out about a course offered by Udemy learning platform called: Learn the Basics of Ethical Hacking and Penetration Testing. I used Google to find out if there is some code to finish that course for free and, of course, I managed to find it (thank you Reddit!). So, from now on I will probably write on my blog some information about how well am I doing in that course.

Also, I’m planning on writing a really long essay about the true type of hackers, who they are and what they do. My point of writing that essay is to try to convince people in my local area to think differently about a word hacker next time they read it on some news reporting sites. The essay will be written in my native language (Bosnian) for one reason only and that is because I know that I’m not excellent with grammar in English language and I don’t want my essay to be full of grammatical errors.