Posts

Keep Going

Image
Hey guys, it’s Elize! Or really, call me EAF.   It’s late, dark, and I’m reflecting while listening to music — like many of you. If you don’t listen to music, consider yourself blessed! Today, I want to talk about the strengths we gain from experience, whether you’re in the same field as me or not. I studied IT, specifically Cybersecurity. At first, I thought the major was just a “fancy name” for a job. But at the time, I was blocking myself from deeper understanding and learning. I had a very self-assertive tone, which especially came out when I was hurt — like being cheated on. Because of my lack of interest in growth and comprehension, I made poor decisions, had unstable relationships, and created an unstable environment. Yet acknowledging these gaps made me notice a lack of depth in my approach to life. Looking back, I realize I’m only 22, and this self-awareness is just the beginning. During that period, I wasn’t caring for myself. But I still cared deeply about others. Wh...

The Power of Structure in Penetration Testing: Building a Path to Security

Image
When people think of penetration testing, they often imagine a world of improvisation—hackers following their instincts, chasing with only obsession, and uncovering GRC's secrets through sheer and limited intuition. But beneath the surface, the most effective penetration testing is really built on foundational understanding, which we call "structure". Structure, it is what transforms to put our intelligence to use, hopefully to apply it. Enough to ensure things are tight before a vulnerability can slip.  Let's explore penetration testing, and why it’s essential for IT. Penetration testing is like the blueprint for a building. Without it, you might miss critical details, repeat steps, or even cause unintended harm. Which, nobody likes. This blueprint brings clarity, consistency, and accountability to the process, because you can see and know the terms in the blueprint. Knowing the blueprint and help communicate findings, measure real results, in this competitive space-...

Hacking Exploits and when to go post exploit: There's no real answer

Image
Wonder if what you're doing, or wth is it for? TO blame your non-existent impatience and then later, your like "oh, should've trusted the process." Which we may do, should be should in this case. In penetration testing, it's the same as picking up an unknown something to you, like if you didn't what a toothbrush was or Ig you found some sort of fuel... Let's go with fuel. You pick up or see charcoal or coal on somewhere somehow, but you didn't know it was fuel. If we consider it, whether by holding onto it or developing a memory that it's there, we start to already find clues into the fuels connection, subconsciously. It's nice to know that our brain may know what to do as we may fail into how to recognize in our "awake" awareness. Back to the coal, we go near stoves, discover fire again and again, and then some day we realize, what if the coal or black thingy or dark thingy was put into there? It's just a piece of charcoal... Coa...

CyberSecurity Dimensions: Holistics, to roles, and responsibilities.

This is cybersecurity. List: Not just firewalls and passwords, but a full spectrum of strategies, systems, behaviors, and architecture working together to: • Prevent compromise • Detect threats • Respond to incidents • Recover and adapt It’s technical, psychological, physical, and procedural — from how data is stored and apps are coded to how people behave, how networks are segmented, and how trust is established or denied. Cybersecurity is a discipline of vigilance, engineering, and foresight, and when done right, it’s invisible until it’s needed most. This is thinking LIKE a system. Critical cybersecurity dimensions: 1. Operational Security (OpSec) 2. Network Security 3. Endpoint Security 4. Application Security 5. Identity and Access Management (IAM) 6. Data Security 7. Security Awareness & Human Factors 8. Physical Security 9. Threat Detection & Deviation Monitoring 10. Incident Response & Recovery 11. Security Architecture & Implementation 12. Governance, Risk, and...

The entire journey: https://panel.exampleapp.net

🧠 Step 0: Human Intent You type: https://panel.exampleapp.net That’s a human-readable name — it needs to be translated to numbers (an IP address) to go anywhere. 📡 Step 1: The “Radio Ping” – Network Stack Fires Up Your device doesn’t yet know where this domain lives. So it checks: 🔍 Is this in my local cache? ❌ Nope? Ask the next source. Your OS builds a DNS query → wraps it in a UDP packet → and sends it via your network interface card (NIC) out into your default gateway . This is like sending a radio signal from your laptop to your ISP’s first router, asking: "Hey, where is panel.exampleapp.net ?" 🌐 Step 2: Recursive Resolver – “The Station Directory Booth” Your request reaches your ISP’s DNS resolver . This resolver is a smart guide that builds the path from scratch if needed: 🧭 It checks if it has the answer cached. ❌ If not, it starts walking the root DNS chain : Ask the root server : "Where are the .net nameservers?" ...

DNS: When One Name Goes Many Ways

Image
Imagine visiting a secure control panel for a cloud-based dashboard — let’s call it panel.exampleapp.net . You expect one clear path, but a DNS query reveals something unexpected: a variety of IP addresses, spanning different number spaces and even protocol types (IPv4 and IPv6). Here's a simplified look: panel.exampleapp.net → 0.1.2.35 panel.exampleapp.net → 1.2.3.35 panel.exampleapp.net → 172.2.0.114 panel.exampleapp.net → 2606:4700:20::681d:523 panel.exampleapp.net → 2606:4700:20::ad43:4672 At first glance, this might raise questions: Why is a single name resolving to different networks — even different types of addresses? 🌍 A Global Dispatch System, Not a Single Gate Think of panel.exampleapp.net not as a door to a single building, but as a radio frequency broadcasted across a secure network of towers worldwide. When your system tunes in (makes a DNS request), it doesn’t get one frequency. Instead, it receives a list of optimal towers — nearby, unjammed, and onl...

What Makes A Server?

Image
In cybersecurity, web development, or ethical hacking, it’s essential to understand what a server actually is — without confusing the concept with interfaces, tools, or websites when servers may be used often in those scenarios, touching exploitable, vulnerable surfaces (just need to identify and follow the CSF [Cybersecurity Framework]). So with the help of ChatGPT , writing this article, saving more time, and explaining intuitively ( <--Search up that word, you're going to need it), this guide cuts through the noise and explains, in plain terms, what makes a server — using simulated examples. 🔧 What Makes a Server? A server is defined by its behavior , not its brand, location, or language. If a system does these below, it is acting as a server: Listens for incoming network requests (like on port 80, 443, or 22) Processes those requests based on logic or rules Responds with content, status, or data Handles multiple clients without direct user initiation...

Understanding DNS and Nameservers: A Complete Guide

Image
The Domain Name System (DNS) is the silent backbone of the internet. It transforms human-friendly domain names into machine-readable IP addresses, allowing users to access websites, send emails, and more without having to memorize numerical addresses. In this article, we break down the components of DNS, how they interact, and why nameservers play such a crucial role. 1. DNS (Domain Name System) DNS, or Domain Name System, works like an internet phonebook. When a user types a domain name like example.com into a browser, DNS translates it into an IP address like 192.0.2.1 , which computers use to locate and connect to each other. 2. Name Server A nameserver is a specialized server that holds the DNS records for a domain. It responds to DNS queries by providing the necessary information to route traffic correctly. For example, if you own friza.net , you might use Cloudflare's nameservers like: abby.ns.cloudflare.com matt.ns.cloudflare.com These servers hold all records...

Modern Websites And Business

In today’s economy, a website isn’t just a digital brochure—it’s the core operational hub of a business. It sells products, handles transactions, processes identities, and often stores customer trust in the form of data. But just like a gleaming flagship store or corporate headquarters, a website must do more than attract visitors—it must protect its assets, enforce policies, and stand resilient under attack. The difference between a secure and vulnerable site isn’t just technical—it’s strategic. Security must be treated as an operational imperative and designed into the website’s foundation with the same attention a Fortune 500 CEO gives to financial controls, supply chains, and brand reputation.  1. Authentication: Gatekeeping the Front Lobby In a physical business, not everyone can walk into executive offices without clearance. Similarly, a website’s authentication system acts as a digital gatekeeper , validating the identity of users, vendors, and staff. Encrypted protocols ...

Conditions or really, the Access Control List: Firewall

Image
More references for more information below: Title Link What Is a Firewall? Cloudflare Access Control Lists (ACLs) Cisco Firewall vs ACL Explained GeeksForGeeks Dynamic ACLs & Firewalls Microsoft Azure Docs Firewall Penetration Testing Offensive Security 🔐 Firewalls and ACLs: The Digital Bouncer Guarding the Network Party In the world of cybersecurity and network infrastructure, firewalls are often the  first line of defense  — but at their core, a firewall is simply an  automated Access Control List (ACL) . To understand how they function, imagine a  VIP party , where only  invited guests  are allowed past the velvet rope. 🎉 The Party Analogy: ACL as the Guest List A  firewall  acts like a  professional bouncer  standing at the door of a high-profile event. But this bouncer doesn't work alone — they use a  guest list  (the ACL) to check who’s allowed in. Like if you're white and you where sunglasses with none dark circles...

APIs: NahamSec Video referencing for more information.

Image
The Waiters of the Web: APIs   Imagine you're at a restaurant. You sit at your table, look at the menu, and decide what you'd like to order. However, you're not going to cook the meal yourself. Instead, you tell the waiter what you want, and the waiter takes the order to the kitchen, where the chef prepares your dish. Then, the waiter brings it back to your table. In the digital world, an API (Application Programming Interface) acts like that waiter. It’s the messenger that takes requests from one system, passes them on to another system, and then brings back the response. APIs enable different software systems to communicate with each other and share data, allowing them to work together even if they're built in different programming languages or running on different devices. What Is an API? An API is a set of rules and protocols that allows one software application to talk to another. It defines how requests are made, what data can be accessed, and what the res...

Short brief presentation about AI

🧠 Cybersecurity & AI: The New Human #AIByCalculation Before machines, there were tally marks on stone walls . Humans counted, tracked, remembered. Over time, we built tools to help— abacuses, ledgers, locks, passwords . Each invention pushed the burden of memory and protection away from our hands. Then came automation. Scripts, programs, firewalls—machines that watched for us. But still, we wrote the rules. Still, we told them how to think. Until now. AI is not a tool we use. AI is a tool that builds tools. A machine that automates automation itself. It doesn’t just follow logic—it generates it . It doesn’t wait for our command—it calculates on instinct . 🔐 Cybersecurity Meets the Synthetic Mind In this new age, threats evolve in real-time . Phishing scams mimic your writing style. Malware morphs after every download. Ransomware thinks. You can’t write rulebooks fast enough. So we gave that job to AI. AI watches millions of logs, decodes patterns, flags anomalies— b...

The pretty and elegant woman that people may be curious of what she sees (Unfortunately, but not ultimately)

🔐 The Secret Cabinet: What Cybersecurity Really Protects She moves with quiet confidence. Red nails gleam as her hand slides a drawer shut— a sleek, obsidian cabinet clicks closed with a satisfying lock. A few passing coworkers glance her way, curious, maybe even envious. What’s in that drawer? A beauty secret? A confidential plan? A hidden flaw? They don’t know. And they never will —because what matters is not what's inside , but the fact that she protects it like it matters. And that’s exactly what cybersecurity does. 🧠 What Is Cybersecurity? Cybersecurity is the discipline of protecting digital assets , just like locking a file cabinet to keep prying eyes, greedy hands, or careless accidents from exposing what should stay private. Whether it's: Personal messages Banking information Proprietary code National secrets ...if it’s valuable, private, or powerful , it needs protecting. 🔒 Let’s Break Down the Cabinet Analogy Imagine the internet is a hig...

That depressed script: Unintended yet planned yesterday somehow till today

Image
Hey blog. Or just—hello, in general. Working online as a Cyber Hunter, competing with other hackers, can be stressful—until you find the one. Suddenly, you realize you're a hacker. Maybe it’s after submitting your first report, or maybe it’s in the moment you spot something others miss. Either way, the realization hits: I’m really doing this. At the same time, hacking while living with family, recovering from an abusive relationship—it’s brighter now. Back then, when people called me “talented but inconsistent,” I was actually fighting unbalance. I stopped showing up to interviews. Stopped going to parties. Stopped drinking—just a little—and sat alone. I was hurting, but I didn’t know it until I found Vodka. Eventually, staying aware saved me. Psychology, something I’d picked up and carried throughout my life, kept me grounded even in chaos. Despite rumors, misunderstandings, and conversations layered with contempt , I still bore the weight—miles away or not. Still, deep in my hea...

Strip down a Website example, a.k.a. Reverse Engineering skill UNLOCKED

Image
 🧠 How a Website Really Works — Broken Down Simply When you open a website like www.example.com , a lot goes on under the hood — but let’s strip it down to the core parts so you see exactly how it runs from top to bottom. 📍 Step 1: You Type a Website into Your Browser When you type a URL (like https://frizasecurity.com ) into your browser and hit Enter, the first thing that happens is: ✅ The browser needs to find the website's IP address. Think of the domain name (like frizasecurity.com ) as a contact name in your phone, and the IP address as the phone number. Your browser asks a DNS server (Domain Name System) to find the number behind that name. You type the name → Browser says: “What’s the IP address for this?” DNS responds: “Here it is: 123.456.789.10 .” 💡 DNS = like the internet’s phone book. 🔄 Step 2: Your Device Talks to the Server Now that your browser knows the IP address, it sends a request to the web server that hosts the site. Think of the...

How does CURL work?

Understanding cURL: The Data Transfer Tool with Hidden Power cURL is a command-line utility and library used to transfer data across networks via a wide range of protocols, including HTTP, HTTPS, and FTP. While often seen as a basic tool for developers, cURL holds advanced capabilities that are rarely discussed in mainstream tech media—capabilities that can significantly extend its usefulness. What cURL Is Really For At its foundation, cURL enables several key functions for easier access in flow: Data Transfer : Seamlessly transfers data across systems using various protocols. API Testing : Enables developers to test, debug, and interact with web APIs. Web Scraping : Extracts content from web pages for analysis or storage. Network Diagnostics : Helps test connectivity and troubleshoot network issues. Automation : Supports scripting and workflow automation for regular data exchanges. However, beyond these standard uses, cURL also offers deeper, often overlooked cap...

Ensuring metadata to our advantage

How Metadata Can Reveal More Than You Think: Unlocking Hidden Secrets At first glance, metadata might seem like a dry, technical term—something you’re not meant to notice or care about. But when you dive into it, you’ll discover that metadata isn’t just about technical details—it’s a powerful tool that can reveal much more about your digital life than you might realize. In fact, metadata can expose hidden patterns, behaviors, and even personal information that many would prefer to keep private. Imagine walking through a busy street, where everyone carries a digital device. As you glance at the crowd, you may only see faces and bodies, but metadata is like the invisible thread that connects everything. It holds the information that describes these interactions, often without you even knowing it. In this article, we’re going to pull back the curtain on metadata and show you how it can reveal more than you might ever expect. 1. What Is Metadata? Before we get into the juicy details, let...