TARA – Threat Analysis and Risk Assessment

Threat Analysis and Risk Assessment (TARA) is a critical process in cybersecurity that helps organizations identify, evaluate, and prioritize potential threats to their information systems and data. As cyber threats continue to evolve, understanding TARA is essential for protecting sensitive information and maintaining the integrity of systems. This summary will provide an overview of TARA Read More …

CRC – Cyclic Redundancy Check

Cyclic Redundancy Check (CRC) is a widely used error-detecting code that helps ensure the integrity of data during transmission or storage. It is a crucial concept in networking and data communication, making it essential for new IT students to understand how it works and its applications. What is CRC? CRC is a method used to Read More …

Hacker TV – GoFetch

This video demonstrates how GoFetch utilizes Bloodhound attack graph data to automatically pivot from an exploited host to the domain controller.  The demonstration begins in Bloodhound, where the presenter identifies the attack path to the domain controller. After finding a path, the graph is exported for use by the attack script. The presenter then launches GoFetch Read More …

smbclient test for 445

While smbclient is primarily used for interacting with SMB shares (like listing shares or accessing files),, it can implicitly indicate if port 445 is open and accessible. If smbclient can successfully connect to an SMB share on a target system, it means port 445 is open on that system and allowing connections. How it works: When you use smbclient Read More …

FCS – Frame Check Sequence

A Frame Check Sequence (FCS) is an essential component in data communication protocols, serving as a method for error detection. It is a sequence of bits added to the end of a data frame, which allows the receiving device to verify the integrity of the data it has received. Understanding FCS is crucial for new Read More …

Hacker TV – All Your Devices Can Be Hacked

Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi’s primary research area is Computer Security, and his latest research focuses on security for electronic medical records. Avi is credited for bringing to light vulnerabilities in electronic voting machines. In 2006 he published a Read More …

Docker GPU Access

Docker containers can effectively allow access to the GPU, particularly through the use of the NVIDIA Container Toolkit, which enables Docker to communicate with NVIDIA GPUs.  This setup is essential for workloads such as AI/ML, deep learning, and data processing that require GPU acceleration to enhance performance.  To enable GPU acceleration, your machine needs a Read More …