Darknet Diaries #33: RockYou
Google Doc | PDF | Word
John the Ripper
Google Doc | PDF | Word
Retrieving Passwords from the Browser
Google Doc | PDF | Word
Peeking at a DACL
Google Doc | PDF | Word
Hash Fun
Google Doc | PDF | Word
HaveIBeenPwned
Google Doc | PDF | Word
Phishing Quiz
Google Doc | PDF | Word
Setting up a chroot Jail
Google Doc | PDF | Word
Exploring VIRUSTOTAL
Google Doc | PDF | Word
Checksumming
Google Doc | PDF | Word
Create a Fake Tweet
Google Doc | PDF | Word
Steganography
Google Doc | PDF | Word
Linux File Permissions
Google Doc | PDF | Word
The One Time Pad
Google Doc | PDF | Word
Using GnuPG
Google Doc | PDF | Word
Certificates, CRLs, and OCSPs
Google Doc | PDF | Word
Ghostery Hunting
Google Doc | PDF | Word
Fiddling with DNS
Google Doc | PDF | Word
Using nslookup and whois
Google Doc | PDF | Word
Google Security Checkup
Google Doc | PDF | Word
Darknet Diaries #52: Magecart
Google Doc | PDF | Word
Digging with Dig
Google Doc | PDF | Word
NicOrNot & Fawkes
Google Doc | PDF | Word
Configuring a Router
Google Doc | PDF | Word
Home Router Hardening
Google Doc | PDF | Word
Using Wireshark
Google Doc | PDF | Word
Canary Tracker
Google Doc | PDF | Word
Configuring a RAID
Google Doc | PDF | Word
Google Dorking
Google Doc | PDF | Word
Installing a Honeypot
Google Doc | PDF | Word
Using dd
Google Doc | PDF | Word
Using Shodan
Google Doc | PDF | Word
Exploring Ransomware
Google Doc | PDF | Word
Darknet Diaries #36: Jeremy from Marketing
Google Doc | PDF | Word
Darknet Diaries #40: No Parking
Google Doc | PDF | Word
Darknet Diaries #54: NotPetya
Google Doc | PDF | Word
Using Sherlock
Google Doc | PDF | Word
Using the Social Engineering Toolkit I
Google Doc | PDF | Word
Phishing Website Experience
Google Doc | PDF | Word
Darknet Diaries #56: Jordan
Google Doc | PDF | Word
Darknet Diaries #69: Human Hacker
Google Doc | PDF | Word
Darknet Diaries #80: The Whistleblower
Google Doc | PDF | Word
Using the Social Engineering Toolkit II
Google Doc | PDF | Word
Researching the Law
Google Doc | PDF | Word
Distilling one Recent News Article
Google Doc | PDF | Word
Install Java
Google Doc | PDF | Word
Install WebGoat
Google Doc | PDF | Word
Broken Authentication - Password Reset
Google Doc | PDF | Word
Bypass Front-End Restrictions
Google Doc | PDF | Word
Client Side Filtering
Google Doc | PDF | Word
HTML Tampering
Google Doc | PDF | Word
Using netcat
Google Doc | PDF | Word
Banner Grabbing
Google Doc | PDF | Word
Using Nmap
Google Doc | PDF | Word
TCP Dump
Google Doc | PDF | Word
Darknet Diaries # 44: Zain
Google Doc | PDF | Word
Â
All content on this page is licensed CC-BY-NC-SA unless otherwise noted.
Darknet Diaries graphic work used with permission. You should check out the podcast. It's unbelievable.