Skip to main content

Recently Updated Pages

The Suspicious Chocolate.exe

Advent of Cyber 2025 Prep Track

Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: ...

Updated 5 months ago by David Rizzo

Welcome to the AttackBox!

Advent of Cyber 2025 Prep Track

Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: ...

Updated 5 months ago by David Rizzo

The CMD Conundrum

Advent of Cyber 2025 Prep Track

Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: ...

Updated 5 months ago by David Rizzo

PKI & SSL/TLS

Security Engineer Intro to Cryptography

Overview The fundamental Diffie-Hellman key exchange is susceptible to a Man-in-the-Middle (MITM)...

Updated 5 months ago by David Rizzo

Authentication

Security Engineer Identity & Access Management

Overview Authentication is the process of verifying a user's or system's claimed identity, distin...

Updated 5 months ago by David Rizzo

Identity

Security Engineer Identity & Access Management

Overview Identification is the process by which a user, process, or system claims a specific iden...

Updated 5 months ago by David Rizzo

IAAA Model

Security Engineer Identity & Access Management

Overview The IAAA model consists of four essential pillars—Identification, Authentication, Author...

Updated 5 months ago by David Rizzo

Hashing

Security Engineer Intro to Cryptography

Overview Cryptographic hash functions transform data of any size into a fixed-length message dige...

Updated 5 months ago by David Rizzo

Authenticating With Passwords

Security Engineer Intro to Cryptography

Overview Cryptography is essential for protecting passwords both in transit (via SSL/TLS) and at ...

Updated 5 months ago by David Rizzo

Individual Game Technical Writeup

National Cyber League

Table of Contents Introduction Open Source Intelligence (OSINT) Cryptography Password Cracking L...

Updated 5 months ago by David Rizzo

Cryptography

National Cyber League

Tools Used RapidTables https://www.rapidtables.com/web/tools/index.html Base64 Binary Hex Stri...

Updated 5 months ago by David Rizzo

Network Topology

Architecture & Network

Subnets LAB Main Media 10.0.0.0/24 VLAN 50 192.168.0.1/24 VLAN 0 192.168.2.0/24 VLAN 20 ...

Updated 5 months ago by David Rizzo

High-Level Overview

Architecture & Network

Updated 5 months ago by David Rizzo

Standard Procedures

Operations & Maintenance

Patching and Update Schedule Adding a New VM or Container Checklist

Updated 5 months ago by David Rizzo

Disaster Recovery

Operations & Maintenance

Step-by-step procedure for recovering a core system (e.g., Firewall) Service restoration order

Updated 5 months ago by David Rizzo

Backup and Recovery Strategy

Operations & Maintenance

What is backed up (config/data), frequency, and retention policy Location of backup storage

Updated 5 months ago by David Rizzo

DNS & DHCP

Services Documentation

Configuration details and upstream DNS providers

Updated 5 months ago by David Rizzo

Monitoring

Services Documentation

Dashboard URLs and Authentication Notes Key Metrics Being Tracked

Updated 5 months ago by David Rizzo

Core Services Index

Services Documentation

Table of all running services (Name, IP, Port, Purpose)

Updated 5 months ago by David Rizzo

Storage Systems

Infrastructure Management

Pool Layout and Redundancy Level (e.g., RAIDZ2) Dataset/Share Mount Points

Updated 5 months ago by David Rizzo