Skip to content

Newsletter

anotsodev

  • Home
  • Penetration Testing
  • Information Security
  • Hack the Box
  • Capture The Flag
  • Online Resources
  • About Me
  • Contact

anotsodev

  • Home
  • Penetration Testing
  • Information Security
  • Hack the Box
  • Capture The Flag
  • Online Resources
  • About Me
  • Contact

Information Security

Attacking and Defending Active Directory Part I

April 24, 2020April 19, 2020 by anotsodev

Reading Time: 3 minutesIntroduction Microsoft Active Directory is one of the most interesting services to attack since we can gather a lot of information …

Read moreAttacking and Defending Active Directory Part I

Categories Information Security, Network Defense, Penetration Testing, Windows Tags active directory, cybersecurity, Information Security, Penetration Testing, windows

How to identify phishing emails

April 24, 2020April 11, 2020 by anotsodev

Reading Time: 5 minutesThis blog post will help you identify phishing emails and learn what are the tools being used in checking if …

Read moreHow to identify phishing emails

Categories General, Information Security, Network Defense Tags coins.ph, cybersecurity, Information Security, malicious email, mxtoolbox, phishing, talosintelligence

Networking Concepts and Protocols

April 24, 2020March 29, 2020 by anotsodev

Reading Time: 4 minutesThis blog post contains the Networking Concepts and Protocols course that can be enrolled in Pluralsight. Feel free to skim …

Read moreNetworking Concepts and Protocols

Categories Cheatsheets, Networking Tags course, cybersecurity, Information Security, networking, pluralsight, protocols

Poor man’s log collection on Windows

April 26, 2020March 28, 2020 by anotsodev

Reading Time: 4 minutesIntroduction As your organization grows, a lot more log collectors either commercial or freeware are needed to be installed on …

Read morePoor man’s log collection on Windows

Categories Logging, Network Defense, Windows Tags cybersecurity, Information Security, log-collection, network-defense, siem, windows

Phases of Penetration Testing

April 24, 2020August 24, 2017 by anotsodev

Reading Time: 3 minutesPenetration Testing or Pentesting is a process where the testers will assess and discover the vulnerabilities that are present in …

Read morePhases of Penetration Testing

Categories Penetration Testing Tags Information Security, Methodologies, phases

First step towards learning and sharing new things

April 24, 2020August 23, 2017 by anotsodev

Reading Time: 2 minutesInformation Security and Ethical Hacking have broad topics to cover and an individual needs to take his or her time …

Read moreFirst step towards learning and sharing new things

Categories General Tags first, fundamentals, hackthebox, Information Security, infosec, step
Copyright © 2025 anotsodev - Information Security Blog