¡Disfruta de 1 año de Premium al 25% de dto! ¡Lo quiero!

Podcast
Learn As I Learn - Technology, Product and Cyberse
62
0
No time to learn? Take out few minutes from your life and learn new things every day!
Please subscribe to start learning for FREE now!
No time to learn? Take out few minutes from your life and learn new things every day!
Please subscribe to start learning for FREE now!
Series 5: Ep 1: Network Basics
Episode 1: Network Basics: Hubs vs. Switches ExplainedDescription: Understand the core of your network! This episode usesPacket Tracer to illustrate the fundamental differences between hub andswitched networks. See how data flows, the impact on efficiency, and thesecurity implications of each.
11:55
Series 5 - Network & Vulnerability Deep Dives
We'll cover:
1. Network Basics: Hubs vs. Switches
2. Building Networks: Designing andSubnetting IP Schemes Description
3.DNS Demystified: Installing a DNS Serverin Windows Server 2022 Description
4: DHCP Dynamics: Implementing a DHCP Serverin Windows Server 2022 Description
5: Firewall & Proxy Bypassing: Metasploitfor Web Recon Description
6: Firewall & Proxy Bypassing: Nikto forEvasion & Vulnerability Scanning Description
7: Vulnerability Assessment: Real-timeScanning with Nessus Description
8: Network Traffic Analysis: TCP/IP, UDP, andWireshark Flags Description
9: IDS/IPS Evasion & Deceptionstudy intruders.
10: Web Server Security: Architecture, AttackSurface & Hardening Description
03:47
Series 4: Ep 10: Locking It Down
Episode 10: Locking It Down: Restricting User Accesswith File Permissions Description: Secure your sensitive data! Learn thecritical skill of restricting user access to folders using NTFS permissions inWindows Server 2022. We'll demonstrate creating new users, setting explicit"Deny" permissions, and verifying their effectiveness, highlightingthe importance of granular access control.
07:37
Series 4: Ep 9: Files & Formats
Episode 9: Files & Formats: Working with FAT32 andNTFS Description: Demystify file systems! This episode guides youthrough creating and managing files in both FAT32 and NTFS formats on WindowsServer 2022. You'll learn how to format drives, perform file operations, verifyallocation, and configure advanced NTFS permissions for security.
11:55
Series 4: Ep 8: Memory Matters
Dig deep into system memory! Learn how to illustrate the memory layout of a basic program and use advanced PowerShell commands (WMI, security-focused queries) todebug, check process integrity, detect DLL injections, and identify suspicious processes on Windows Server 2022.
Commands:
Get-Process | Where-Object { $_.ProcessName -eq "notepad" }
Get-WmiObject -Class Win32_OperatingSystem | Select-Object TotalVisibleMemorySize, FreePhysicalMemory
Get-Process
Get-WmiObject -Class Win32_Process | Select Name, ProcessId, ExecutablePath. For new powershell version simply use: Get-Process | Select-Object Name, Id, Path
Get-WmiObject -Class Win32_Process | Select-Object Name, ProcessId, ParentProcessId
Get-WmiObject -Class Win32_Process -Filter "Name = 'notepad.exe'" | Select-Object ProcessId, Name, @{Name='Owner';Expression={$_.GetOwner().User}}
Get-Process -Name notepad | Select-Object -ExpandProperty Modules | Select ModuleName, FileName
Get-WmiObject Win32_Process | Where-Object { $_.ExecutablePath -and ($_.ExecutablePath -notlike "C:Windows*" -and $_.ExecutablePath -notlike "C:Program Files*") } | Select Name, ProcessId, ExecutablePath
Get-Process | Where-Object { $_.Modules.ModuleName -contains "ntdll.dll" }
Get-WmiObject Win32_Process | Select-Object Name, ProcessId, CommandLine
Get-Process | Sort-Object StartTime -Descending | Select-Object Name, Id, StartTime | Select-Object -First 10
13:56
Series 4: Ep 7: Debugging Your Code
Don't let errors stop you! This episode focuses on practical debugging techniques for both PowerShell and Bash scripts. We'll intentionally introduce common errors (like typos or wrong parameters) and walk through how to identify and fix them, building crucial troubleshooting skills.
Powershell Script:
#Script to log multiple event IDs
$BeginTime = (Get-Date).AddMinutes(-20)
Get-EventLog -LogName "Securityy" -After $BeginTime |
Where-Object { $_.EventID -in '4624', '4625'} |
Select-Object TimeGenerated, EventID, Message |
Format-Table -AutoSize |
Out-Files C:EventLogs_MultipleEvents.txt
BASH Script:
#!/bin/bash
#Variables
USERNAME="testuser" # User accountname
PASSWORD="P@ssw0rd" # User password
GROUP="testgroup" # Custom groupname
SSH_DIR="/home/$USERNAME/.ssh"
PUB_KEY="ssh-rsa AAAAB3...your-public-key... user@kali"
#Step 1: Check ifuser already exists
if id "$USERNAME" &>/dev/null; then
echo "Error: User '$USERNAME'already exists!"
exit 1
fi
#Step 2: Create userand set password
echo "Creating user '$USERNAME'..."
useradd -m -n -s /bin/bash "$USERNAME" # Error 1: -n is an invalidoption
if [ $? -ne 0 ]; then
echo "Error: Failed to create user'$USERNAME'"
exit 1
fi
echo "$USERNAME:$PASSWORD" | chpasswd
echo "Password set for user '$USERNAME'."
#Step 3: Add user tosudoers
echo "Granting sudo access to '$USERNAME'..."
usermod -aG sudo "$USERNAME"
if [ $? -ne 0 ]; then
echo "Error: Failed to add'$USERNAME' to sudoers"
exit 1
fi
#Step 4: Createcustom group and add user
echo "Creating group '$GROUP' and adding user..."
groupadd "$GROUP" 2>/dev/null
usermod -aG "wronggroup" "$USERNAME" # Error 2:"wronggroup" does not exist
if [ $? -ne 0 ]; then
echo "Error: Failed to add'$USERNAME' to group '$GROUP'"
exit 1
fi
#Step 5: Setup SSHkey-based authentication
echo "Setting up SSH key-based authentication..."
mkdir -p "$SSH_DIR"
echo "$PUB_KEY" > "$SSH_DIR/authorized_keys"
chmod 600 "$SSH_DIR/authorized_keys"
chmod 700 "$SSH_DIR"
chown -R "$USERNAME:$USERNAME" "$SSH_DIR"
if [ $? -ne 0 ]; then
echo "Error: Failed to set up SSHkeys"
exit 1
fi
echo "SSH keys configured for '$USERNAME'."
#Step 6: Setpassword expiry to 30 days
echo "Setting password expiry policy for '$USERNAME'..."
chage -M 30 "$USERNAME"
if [ $? -ne 0 ]; then
echo "Error: Failed to setpassword expiry"
exit 1
fi
#Step 7: Logactivity to/var/log/user_setup.log
LOG_FILE="/var/log/user_setup.log"
echo "$(date) - User '$USERNAME' created and configured" >>"$LOG_FILE"
if [ $? -ne 0 ]; then
echo "Error: Failed to write logto $LOG_FILE"
exit 1
fi
#Step 8:Confirmation Message
echo "Testing SSH connection to '$USERNAME'@localhosts..."
ssh "$USERNAME@localhost"
if [ $? -ne 0 ]; then
echo "Error: SSH connection failed."
exit 1
fi
echo "User '$USERNAME' created and configured successfully!"
09:05
Series 4: Ep 6: Bash Scripting Essentials
Master automation in Linux with Bash scripts! Discover how to create and debug scripts for user setup, including creating new users, setting passwords, adding them to groups, configuring SSH key-based login, and setting password expiry. We’ll also cover testing and verification.
Script:
#!/bin/bash
#Variables
USERNAME="Jason" # User account name
PASSWORD="P@ssw0rd" # User password
GROUP="developers" # Custom group name
SSH_DIR="/home/$USERNAME/.ssh"
PUB_KEY="ssh-rsa AAAAB3...your-public-key... user@kali" # Replace with your actual public key
#Step 1: Check if user already exists
if id "$USERNAME" &>/dev/null; then
echo "Error: User '$USERNAME' already exists!"
exit 1
fi
#Step 2: Create user and set password
echo "Creating user '$USERNAME'..."
useradd -m -s /bin/bash "$USERNAME"
if [ $? -ne 0 ]; then
echo "Error: Failed to create user '$USERNAME'"
exit 1
fi
echo "$USERNAME:$PASSWORD" | chpasswd
echo "Password set for user '$USERNAME'."
#Step 3: Add user to sudoers
echo "Granting sudo access to '$USERNAME'..."
usermod -aG sudo "$USERNAME"
if [ $? -ne 0 ]; then
echo "Error: Failed to add '$USERNAME' to sudoers"
exit 1
fi
#Step 4: Create custom group and add user
echo "Creating group '$GROUP' and adding user..."
groupadd "$GROUP" 2>/dev/null
usermod -aG "$GROUP" "$USERNAME"
if [ $? -ne 0 ]; then
echo "Error: Failed to add '$USERNAME' to group '$GROUP'"
exit 1
fi
#Step 5: Setup SSH key-based authentication
echo "Setting up SSH key-based authentication..."
mkdir -p "$SSH_DIR"
echo "$PUB_KEY" > "$SSH_DIR/authorized_keys"
chmod 600 "$SSH_DIR/authorized_keys"
chmod 700 "$SSH_DIR"
chown -R "$USERNAME:$USERNAME" "$SSH_DIR"
if [ $? -ne 0 ]; then
echo "Error: Failed to set up SSH keys"
exit 1
fi
echo "SSH keys configured for '$USERNAME'."
#Step 6: Set password expiry to 30 days
echo "Setting password expiry policy for '$USERNAME'..."
chage -M 30 "$USERNAME"
if [ $? -ne 0 ]; then
echo "Error: Failed to set password expiry"
exit 1
fi
#Step 7: Log activity to /var/log/user_setup.log
LOG_FILE="/var/log/user_setup.log"
echo "$(date) - User '$USERNAME' created and configured" >> "$LOG_FILE"
if [ $? -ne 0 ]; then
echo "Error: Failed to write log to $LOG_FILE"
exit 1
fi
#Step 8: Confirmation Message
echo "User '$USERNAME' created and configured successfully!"
12:26
Series 4: Ep 5: Powering Up with PowerShell
Unlock automation on Windows! We'll start with PowerShell basics, showing you how to write, execute, and expand simple scripts to display messages, get dates, list processes, and manage services. Learn to automate tasks efficiently on Windows Server 2022.
Commands:
.WelcomeScript.ps1
Get-Date
Get-Process
Get-Service | Where-Object { $_.Status -eq 'Running' }
Get-WmiObject -Class Win32_Product | Select-Object Name,Version
Get-NetIPAddress
10:27
Series 4: Ep 4: Linux Reconnaissance
Explore active information gathering in Linux! This episode teaches you how to enumerate a vulnerable Bee-Box machine using Kali Linux tools. You'll learn Nmap for identifying open ports and services, and Metasploit for deeper SMTP enumeration, strengthening your reconnaissance skills.
Link: Bee-Box official download page
Commands: nmap -Pn -sS –sV <Bee-Box IP Address>
nmap -Pn -sS -sV -p 25 <Bee-Box IP Address>
auxiliary/scanner/smtp/smtp_enum
set RHOSTS <IP of the Bee-Box>
set THREADS <Number of Logical Processors>
13:26
Series 4: Ep 3: Windows System Deep Dive
Uncover the hidden information on Windows systems! Learn how to use Microsoft's powerful PsTools suite to gather system information, track user sessions, enumerate services, and analyze event logs on a Windows Server 2022. We'll explorecommands like pslist.exe, psloglist.exe, and saving output to files.
PsTools Link: https://learn.microsoft.com/en-us/sysinternals/downloads/pstools.
Commands: .pslist.exe
.psloggedon.exe
.psloglist.exe
.psservice.exe
Save output by:
.psloglist.exe >> C:Logdata.txt
09:58
Series 4: Ep 2: Deploying Your Target
Get your target ready! This episodeguides you through downloading and setting up a Windows Server 2022 virtualmachine within VMware. We'll walk through the installation processstep-by-step, preparing a vulnerable environment for your ethical hacking adventures.
Link I used for myself: https://www.microsoft.com/en-us/evalcenter/download-windows-server-2022.
09:55
Series 4: Ep 1: Building Your Digital Lab
Episode 1: Building Your Digital Lab – VMware & Kali Linux Setup
Kick off your cybersecurity journey with the essentials! In this episode, we guide you through creating a secure virtualized environment by installing VMware Workstation and setting up your Kali Linux virtual machine for penetration testing. From downloading the ISO to configuring your VM settings, we’ll walk you through every step to build your personal digital lab.
👉 Download VMware Workstation here: https://www.techspot.com/downloads/189-vmware-workstation-for-windows.html
09:49
Series 4 - Going a level deeper - Introduction
🎙️ Series 4: Laying the Foundations
Kickstart your cybersecurity journey with hands-on labs and real-world skills! In this series, we’ll set up virtual machines, explore Windows and Linux systems, and dive into scripting, debugging, and securing environments. Perfect for beginners and aspiring ethical hackers.
Episodes:
1️⃣ Building Your Digital Lab – Set up VMware Workstation and Kali Linux for penetration testing.
2️⃣ Deploying Your Target – Install Windows Server 2022 as a vulnerable lab machine.
3️⃣ Windows Deep Dive – Use PsTools to enumerate users, services, and event logs.
4️⃣ Linux Reconnaissance – Master Nmap and Metasploit against a Bee-Box target.
5️⃣ Powering Up with PowerShell – Learn the basics of scripting and automation on Windows.
6️⃣ Bash Scripting Essentials – Automate user management and SSH setup in Kali Linux.
7️⃣ Debugging Your Code – Fix common PowerShell and Bash scripting errors.
8️⃣ Memory Matters – Explore program memory layouts and forensic queries with PowerShell.
9️⃣ Files & Formats – Work with FAT32 and NTFS, file operations, and permissions.
🔟 Locking It Down – Restrict user access and secure folders with NTFS permissions.
05:37
Series 3: Ep 10: The Cyber Citadel Blueprint – Building a Scalable Security Program
Bring all concepts together and let's start working on security together
07:49
Series 3: Ep 9: The Human Firewall – Building Security Culture & Awareness
People - Both strongest and the weakest links
06:38
Series 3: Ep 8: The GRC Framework – Holding the Citadel Together
GRC - Governance, Risk and Compliance -> Team leading security at every organization
08:04
Series 3: Ep 7: Breach Ready – Incident Detection & Response
In this episode, we dive into building breach-ready systems with strong incident detection and response strategies. Learn how to identify threats early, contain damage, and recover fast.
10:39
10:23
Series 3: Ep 4: Building Your Cyber Citadel
Today, we're diving headfirst into the fascinating world of Security and Risk Management.
10:53
Series 3: Ep 5: How to identify and classify assets
Let's start by understanding the first step of building a cyber citadel
13:12
You may also like View more
Cuentos para irse a Dormir
En estos cuentos tan especiales que hacemos tenemos a nuestra protagonista Lara, una niña que lleva desde los 2 añitos y medio compartiendo cuentos de todo tipo con vosotros.
Comenzamos con cuentos pero Lara va creciendo (ya tiene casi 7 añitos) y vamos incorporando cosas como lecturas o podcast y quien sabe que otras sorpresas tendremos
Updated
La Canastilla de Mamá
Soy madre de dos niños, profesora y periodista. Desde aquí compartiré con vosotros mis experiencias, dudas y vivencias relacionadas con la maternidad, la educación y la salud. Updated
Sapiensantes
¿Te imaginas meterte dentro de una boca para saber por qué hay que lavarse los dientes? ¿O en una cabeza y descubrir como se vive la vida siendo un piojo? Eso ocurre en 'Sapiensantes', este podcast de ciencia para niños y para toda la familia. Los niños y niñas hacen preguntas científicas y Xaviera Torres responde con frescura y mucha imaginación. El diseño de sonido, que firma Juan Luis Martín, ayuda a convertir el podcast en una experiencia inmersiva y muy divertida. Updated




