Josh Brade

OSI Model & Cybersecurity

1. Physical Layer (Layer 1) 2. Data Link Layer (Layer 2) 3. Network Layer (Layer 3) 4. Transport Layer (Layer 4) 5. Session Layer (Layer 5) 6. Presentation Layer (Layer 6) 7. Application Layer (Layer 7) Summary The OSI model helps categorize cybersecurity threats and identify at which layer they occur. It also guides implementing… Continue reading OSI Model & Cybersecurity

A Few Cybersecurity Linux Tools to Explore

Information Gathering & Reconnaissance Vulnerability Analysis & Exploitation Wireless & Network Attacks Forensics & Post-Exploitation Password & Hash Attacks Malware Analysis, Vulnerability Research, & Incident Response

Installing Kali Linux as Proxmox Container

Obtaining the Latest Kali Image When it comes to getting the latest Kali image, follow these steps: Navigate to the Image Source – First, head over to the official Kali Linux images repository at https://images.linuxcontainers.org/images/kali/current/amd64/default/. Select the Current Version Folder – Within the repository, locate and click on the folder that corresponds to the current… Continue reading Installing Kali Linux as Proxmox Container