Blog

Using TryHackMe Cyberrange for CSC Workshops

CSC HTB

For cyber security training, it's beneficial to create accounts on well-known cyberranges that offer both free and paid training:

Read
Building Your Bash Toolkit: Simplifying Key-Value Extractions with `extract_value`

CSC bash Tools Bash-Toolkit

In our previous post of the Building Your Bash Toolkit series, we delved deep into the process_args function, a utility that enables our bash scripts to handle both piped and direct inputs effortlessly. With that power in hand, we are set to further simplify some of the common bash scripting tasks.

Read
Building Your Bash Toolkit: Creating a Dynamic Argument Processor in Bash

CSC bash Tools Bash-Toolkit

In the inaugural blog post of our Building Your Bash Toolkit series, we embarked on a journey to simplify our Bash interactions. Today, we dive deeper, introducing a utility function, process_args, that seamlessly merges both direct and piped inputs.

Read
Building Your Bash Toolkit: Getting Started

CSC bash Tools Bash-Toolkit

Welcome to the first installment of our series on developing your own set of Bash tools. For those who frequently work in the terminal, you'll understand the immense value in having a suite of custom tools tailored to your needs. This series aims to guide you in building that toolkit, ensuring you streamline and simplify those recurring actions in the terminal.

Read
Mounting a host folder in WSL or VirtualBox Kali machine

Kali CSC

Most people using kali won't use it on a dedicated machine. For Windows users most would use kali from WSL (Windows Subsystem for Linux). Other would use a virtual machine in VirtualBox or other virtualization environment. In this post we will only cover VirtualBox. In this case it can be useful to have a folder on the host machine that can be shared in the kali environment.

Read