Hacking
-
Noise Avoidance: Network Scanning with Nmap and Zenmap
Nmap is a command-line network scanner used to detect hosts and services. Zenmap is a GUI version of nmap.
-
Offensive Security Phases and Frameworks
A cheat sheet of offensive security attack types, phases, and frameworks (i.e., Mandiant). Helps find what tools to use in each attack phase.
-
Creating a VM for Malware Analysis in VirtualBox
Learn how to create a sandboxed Windows 10 Virtual Machine (VM) for malware analysis in VirtualBox. Great for CSEC202 at RIT!
-
CIA Triad: Confidentiality, Integrity, Availability
The CIA triad is a widely recognized model in cybersecurity. Here, CIA stands for Confidentiality, Integrity, and Availability.
-
Black Hat Optis Series Judging Criteria
I interviewed sixty industry leaders from over forty companies at Black Hat. Here are the 21 companies whose growth I recommend watching.
-
Hacking Competitions
This post is a continuously updated timeline of Olivia A. Gallucci’s participation in international, regional, and local cybersecurity competitions.
-
Presentations
This post is a continuously updated timeline of Olivia A. Gallucci’s international, regional, and local cybersecurity presentations.