<?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en"
	xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" >
	<title type="text">ikawnoclastic thoughts</title>
	<subtitle type="text">contemplating information security</subtitle>

	<updated>2026-02-23T02:52:57Z</updated>

	<link rel="alternate" type="text/html" href="https://ikawnoclast.com" />
	<id>http://ikawnoclast.com/feed/atom/</id>
	<link rel="self" type="application/atom+xml" href="https://ikawnoclast.com/feed/atom/" />

	<generator uri="http://wordpress.com/">WordPress.com</generator>
<link rel="search" type="application/opensearchdescription+xml" href="https://ikawnoclast.com/osd.xml" title="ikawnoclastic thoughts" />
<link rel="search" type="application/opensearchdescription+xml" href="https://s1.wp.com/opensearch.xml" title="WordPress.com" />
	<link rel='hub' href='https://ikawnoclast.com/?pushpress=hub' />
	<entry>
		<author>
			<name>ikawnoclast</name>
							<uri>https://ikawnoclast.com</uri>
						</author>

		<title type="html"><![CDATA[My Claude Code Notes]]></title>
		<link rel="alternate" type="text/html" href="https://ikawnoclast.com/2026/02/22/my-claude-code-notes/" />

		<id>http://ikawnoclast.com/?p=13076</id>
		<updated>2026-02-23T02:52:57Z</updated>
		<published>2026-02-23T02:48:51Z</published>
		<category scheme="https://ikawnoclast.com" term="AI" /><category scheme="https://ikawnoclast.com" term="Claude" /><category scheme="https://ikawnoclast.com" term="Coding Agents" /><category scheme="https://ikawnoclast.com" term="agents" /><category scheme="https://ikawnoclast.com" term="artificial-intelligence" /><category scheme="https://ikawnoclast.com" term="claude code" /><category scheme="https://ikawnoclast.com" term="llm" />
		<summary type="html"><![CDATA[I haven&#8217;t programmed professionally in more than twenty years. Even then I am not sure what I did could be considered professional programming. However, I dabble in programming and have written some tools for my own use. One in particular I use everyday. Lately, I have been experimenting with Claude Code. I don&#8217;t think I [&#8230;]]]></summary>

					<content type="html" xml:base="https://ikawnoclast.com/2026/02/22/my-claude-code-notes/"><![CDATA[
<p class="wp-block-paragraph">I haven&#8217;t programmed professionally in more than twenty years. Even then I am not sure what I did could be considered professional programming. However, I dabble in programming and have written some tools for my own use. One in particular I use everyday. Lately, I have been experimenting with <a href="https://claude.com/product/claude-code">Claude Code</a>. I don&#8217;t think I need to impress upon you the value of this coding agent.</p>



<p class="wp-block-paragraph">I am learning how to use Claude Code effectively and to avoid burning through too many tokens. This post is a collection of my notes from using Claude Code. I expect to revisit and edit this post frequently, as we are in time-warp inducing increase in AI capabilities.</p>



<span id="more-13076"></span>



<p class="wp-block-paragraph"><strong>UPDATED: February 22, 2026</strong></p>



<h1 class="wp-block-heading">RTFM &#8212; Read the Friendly Manual</h1>



<p class="wp-block-paragraph">I know many people that just want to get started and play. That&#8217;s great. Get your hands dirty and just go. But&#8230;</p>



<p class="wp-block-paragraph">At some point you should check out the docs from Anthropic, you might learn some new things. <a href="https://code.claude.com/docs">https://code.claude.com/docs</a></p>



<h1 class="wp-block-heading"><code>CLAUDE.md</code></h1>



<p class="wp-block-paragraph"><code>CLAUDE.md</code> is a Markdown file at the top of your project folder. Think of it as a project-specific system prompt for Claude Code. It helps guide Claude Code. While the <code>/init</code> command will create an initial version of the <code>CLAUDE.md</code> file in your project directory, you can add more content to it or edit what Claude Code inserts there.</p>



<p class="wp-block-paragraph">The content in <code>CLAUDE.md</code> can help Claude Code as it works on the project. By having important project details in one place, Claude Code doesn&#8217;t have to go discover this information each time. You can have a global <code>CLAUDE.md</code> file in your home directory (<code>~/.claude/CLAUDE.md</code>), which tells Claude how to work with you. A project-specific <code>CLAUDE.md</code> file in each project folder can be included in the git repo and shared. You can also have a project-specific file (<code>CLAUDE.local.md</code>) that is local to you and not in the git repo.</p>



<h1 class="wp-block-heading">Use Plan Mode</h1>



<p class="wp-block-paragraph">Put Claude Code into plan mode any time you need to add create new functionality, add features, refactor code, or fix bugs. Plan mode should be used when you need the existing code analyzed to determine the changes needed. Claude Code will show you the plan before any changes are made. This your opportunity to check that plan for errors or needed additions. Once the plan is ready, Claude Code will start making the modifications.</p>



<p class="wp-block-paragraph">Put Claude Code into plan mode by using the <code>/plan</code> command or Shift+Tab.</p>



<h1 class="wp-block-heading">Store Plans in the Project Directory</h1>



<p class="wp-block-paragraph">Whenever plans are created before changes are made, Claude Code will place those plans in the Claude Code home directory (<code>~/.claude/plans/</code>). Ideally, those plans should be stored in the project directory. After the plan is created, tell Claude Code to store the plan in the project directory. I usually create a <code>plans</code> directory and tell Claude Code to put the plan in that directory.</p>



<p class="wp-block-paragraph">I have added this requirement to my global <code>CLAUDE.md</code> file.</p>



<h1 class="wp-block-heading">Enable Extended Thinking</h1>



<p class="wp-block-paragraph"><a href="https://platform.claude.com/docs/en/build-with-claude/extended-thinking">Extended Thinking </a>(or &#8220;thinking mode&#8221;) is helpful for complex tasks. This mode enables the model&#8217;s enhanced reasoning step-by-step thought process. Complex tasks could be starting a new project, implementing new features, correcting security issues, etc.</p>



<h1 class="wp-block-heading">Choosing Models</h1>



<p class="wp-block-paragraph">Claude Code allows you to select models at any point during your work. Each model has different token consumption and speed. For complex planning, you may be better served by a higher end model. For well-defined tasks or simple changes, a faster, less token-hungry model might be fine.</p>



<h2 class="wp-block-heading">Opus &#8212; Best</h2>



<ul class="wp-block-list">
<li>Planning</li>



<li>Coding </li>



<li>Troubleshooting</li>
</ul>



<h2 class="wp-block-heading">Sonnet &#8212; Capable</h2>



<ul class="wp-block-list">
<li>Coding with a detailed plan</li>



<li>Security code review</li>



<li>Basic troubleshooting</li>
</ul>



<h2 class="wp-block-heading">Haiku &#8212; Fast and Efficient</h2>



<ul class="wp-block-list">
<li>Code summary</li>



<li>Basic code review</li>



<li>Documentation</li>
</ul>



<p class="wp-block-paragraph">There is also the &#8220;opusplan&#8221; model which uses Opus for any planning and Sonnet for implementation. This is useful so that you don&#8217;t have to manually switch between the two. </p>



<p class="wp-block-paragraph">Switch your model with the <code>/model</code> command.</p>



<h2 class="wp-block-heading">Effort</h2>



<p class="wp-block-paragraph">The Opus and Sonnet models support an effort setting, which allows you to select the balance between and token efficiency. More effort means more tokens consumed but possibly better results with a given task. There is a balance here that will require more experimentation. </p>



<p class="wp-block-paragraph">You configure effort when you select the model using the <code>/model</code> command. It applies (for now) to the Opus and the Sonnet 4.6+ models. Use the arrow key on a selected model to set the effort.</p>



<h1 class="wp-block-heading">More to Come</h1>



<p class="wp-block-paragraph">I realized as I wrote this that there are a lot more notes that I have. Some are very specific and dive deeper. I will save that content for another blog post. </p>
]]></content>
		
					<link rel="replies" type="text/html" href="https://ikawnoclast.com/2026/02/22/my-claude-code-notes/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://ikawnoclast.com/2026/02/22/my-claude-code-notes/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
		<entry>
		<author>
			<name>ikawnoclast</name>
							<uri>https://ikawnoclast.com</uri>
						</author>

		<title type="html"><![CDATA[My Approach to Managing Dot Files with GNU Stow]]></title>
		<link rel="alternate" type="text/html" href="https://ikawnoclast.com/2025/05/19/my-approach-to-managing-dot-files-with-gnu-stow/" />

		<id>http://ikawnoclast.com/?p=8037</id>
		<updated>2025-05-19T13:36:23Z</updated>
		<published>2025-05-19T13:12:59Z</published>
		<category scheme="https://ikawnoclast.com" term="systems" /><category scheme="https://ikawnoclast.com" term="command-line" /><category scheme="https://ikawnoclast.com" term="configuation" /><category scheme="https://ikawnoclast.com" term="linux" /><category scheme="https://ikawnoclast.com" term="tools" /><category scheme="https://ikawnoclast.com" term="unix" />
		<summary type="html"><![CDATA[How I use GNU Stow to manage Linux/UNIX command-line tool configuration files.]]></summary>

					<content type="html" xml:base="https://ikawnoclast.com/2025/05/19/my-approach-to-managing-dot-files-with-gnu-stow/"><![CDATA[
<p class="wp-block-paragraph"><a href="https://www.gnu.org/software/stow/">GNU Stow</a> is used to manage configuration files for my Linux/UNIX tools and applications on all of my personal systems. The term &#8220;Dot Files&#8221; is<br>a reference to configuration files for many Linux/UNIX tools that prefix their configuration files with a &#8220;.&#8221; (in other words a &#8220;dot&#8221;). I maintain the configuration files in a shared directory (<code>~/Shared/DotFiles</code>) that is replicated across systems using <a href="https://syncthing.net/">SyncThing</a>. Stow creates a series of symbolic links from the standard and known locations for those configuration files to the actual location of the configuration files in the shared configuration directory.</p>



<p class="wp-block-paragraph">These instructions in this post serve as a reminder to me on how I use Stow to add new configuration files in the shared configuration folder or to update existing files. Perhaps, this content can be helpful for you too.</p>



<h2 class="wp-block-heading" id="tldr">TL;DR</h2>



<p class="wp-block-paragraph">Use these commands to link dotfiles using the Stow command:</p>


<div class="wp-block-syntaxhighlighter-code "><pre class="brush: plain; title: ; notranslate">
$ cd ~/Shared/DotFiles
$ stow -v --target=$HOME -S PKG
</pre></div>


<p class="wp-block-paragraph">The <em>PKG</em> parameter is a directory in the <code>~/Shared/DotFiles</code> directory that contains a collection of related files and directories. For example, I have a series of files for my Bash configuration in the <code>bash</code> directory. To install those, use the following command:</p>


<div class="wp-block-syntaxhighlighter-code "><pre class="brush: plain; title: ; notranslate">
$ cd ~/Shared/DotFiles
$ stow -v --target=$HOME -S bash
</pre></div>


<p class="wp-block-paragraph">Use the same command with each package directory in <code>~/Shared/DotFiles</code> to install the symbolic links for that package.</p>



<span id="more-8037"></span>



<h2 class="wp-block-heading" id="stowing-dotfiles-from-a-shared-directory">Stowing Dotfiles from a Shared Directory</h2>



<p class="wp-block-paragraph">Here is a simple example for using Stow to create a link to the configuration file for Starship.</p>


<div class="wp-block-syntaxhighlighter-code "><pre class="brush: plain; title: ; notranslate">
$ cd ~/Shared/DotFiles
$ stow -v --target=$HOME -S starship
</pre></div>


<p class="wp-block-paragraph">There is only one file to link: <code>~/.config/starship.toml</code></p>



<p class="wp-block-paragraph">Here is another example to update the configuration files for Doom Emacs.</p>


<div class="wp-block-syntaxhighlighter-code "><pre class="brush: plain; title: ; notranslate">
$ cd ~/Shared/DotFiles
$ stow -v --target=$HOME -S doom
</pre></div>


<p class="wp-block-paragraph">Doom Emacs is unique in that it has configuration files that can be shared across systems stored in <code>~/.config/doom</code>. However, it also compiles code unique to each system it runs on that can’t be shared due to machine instruction differences (e.g., x86_64 versus arm64 machine code). Doom Emacs includes a script to manage the packages used and the compilation process, which is separate from the configuration file management tasks using Stow. </p>



<h2 class="wp-block-heading" id="creating-package-directories-for-stow">Creating Package Directories for Stow</h2>



<p class="wp-block-paragraph">The collection of configuration files and directories that can be linked to with Stow are referred to as <em>packages</em>. You must organize the files and directories under the package directories as they should appear under your home directory.</p>



<p class="wp-block-paragraph">Here is an example to create a simple package for a single configuration file:</p>


<div class="wp-block-syntaxhighlighter-code "><pre class="brush: plain; title: ; notranslate">
$ cd ~/Shared/DotFiles
$ mkdir bash
$ mv ~/.bashrc bash
</pre></div>


<p class="wp-block-paragraph">Just remember that the <code>.bashrc</code> file will be hidden since it is prefixed with a “.”.</p>



<p class="wp-block-paragraph">Here is a more complicated example that uses the <code>~/.config</code> folder:</p>


<div class="wp-block-syntaxhighlighter-code "><pre class="brush: plain; title: ; notranslate">
$ cd ~/Shared/DotFiles
$ mkdir -p starship/.config
$ mv ~/.config/starship.toml starship/.config
</pre></div>


<p class="wp-block-paragraph">Stow will create a symbolic link in the <code>~/.config</code> directory named <code>starship.toml</code> which points to the <code>~/Shared/DotFiles/starship/.config/starship.toml</code> configuration file.</p>



<p class="wp-block-paragraph">Create your package directories so that they have a file structure that mimics the structure needed for Stow to create symbolic links to appropriate files and directories.</p>



<h1 class="wp-block-heading" id="using-stow">Using Stow</h1>



<p class="wp-block-paragraph">Stow is described in the documentation as a link farm manager and was originally designed to administer software packages. Its flexibility allows for this use as a personal configuration file management tool. For more information see the <a href="https://www.gnu.org/software/stow/manual/stow.html" target="_blank" rel="noreferrer noopener">main Stow documentation</a>.</p>



<h2 class="wp-block-heading" id="shared-configuration-file-and-directory-location">Shared Configuration File and Directory Location</h2>



<p class="wp-block-paragraph">When using Stow, you should change to the directory where the shared configuration files are stored. In my case that is <code>~/Shared/Dotfiles</code>.</p>


<div class="wp-block-syntaxhighlighter-code "><pre class="brush: plain; title: ; notranslate">
$ cd ~/Shared/DotFiles
</pre></div>


<p class="wp-block-paragraph">Once there, you can execute the Stow commands.</p>



<h3 class="wp-block-heading" id="hidden-files-in-packages">Hidden Files in Packages</h3>



<p class="wp-block-paragraph">The <code>~/Shared/DotFiles</code> directory contains packages with hidden files. These hidden files are configuration files with file names prefixed with a ‘.’. Be sure to look for hidden files in those sub-directories.</p>



<h2 class="wp-block-heading" id="stow-options">Stow Options</h2>



<p class="wp-block-paragraph">There are several Stow options to be aware of.</p>



<h3 class="wp-block-heading" id="verbose-output">Verbose Output</h3>



<p class="wp-block-paragraph">Use the “-v” option generate verbose output from the stow command. This might help with diagnosing issues.</p>



<h3 class="wp-block-heading" id="show-but-dont-do">Show But Don’t Do</h3>



<p class="wp-block-paragraph">You may want to see what stow would do before you want to make changes. You can use the “-n”, “–no”, or “–simulate” options to show the actions stow would take.</p>



<h3 class="wp-block-heading" id="set-your-target">Set Your Target</h3>



<p class="wp-block-paragraph">Stow needs to know where to create links. Use the “-t <em>DIR</em>” or “–target=<em>DIR</em>” options to set the location where stow should build symbolic links to your dot files. In almost all cases, this should your home directory: $HOME. For example, I use “–target=$HOME”.</p>



<h3 class="wp-block-heading" id="stow-those-files">Stow Those Files</h3>



<p class="wp-block-paragraph">To create the links, use the “-S” or “–stow” option.</p>



<h3 class="wp-block-heading" id="unstow-those-files">Unstow Those Files</h3>



<p class="wp-block-paragraph">To delete the links, use the “-D” or “–delete” option. This will delete previously created links.</p>



<h3 class="wp-block-heading" id="restow-files">Restow Those Files</h3>



<p class="wp-block-paragraph">Why would you ever want to do this? Well you need to cleanup some older obsolete symbolic links. Use the “-R” or “–restow” option to unstow/delete and then to stow the packages.</p>



<h3 class="wp-block-heading" id="adopt-existing-files">Adopt Existing Files</h3>



<p class="wp-block-paragraph">You can use Stow to take existing files and incorporate or adopt them into the DotFiles package structure. This might not do want you intend. Use caution with this option.</p>



<h1 class="wp-block-heading" id="version-control-with-git">Version Control with git</h1>



<p class="wp-block-paragraph">You can use <a href="https://git-scm.com/" target="_blank" rel="noreferrer noopener">git</a> or another source code management tool to track changes to the DotFiles packages over time. I have not yet implemented this, but I plan to document the use of git for this purpose at a later date.</p>



<h1 class="wp-block-heading" id="references">References</h1>



<ul class="wp-block-list">
<li><a href="https://www.gnu.org/software/stow/">GNU Stow</a></li>



<li><a href="https://www.gnu.org/software/stow/manual/stow.html">Stow Documentation</a></li>



<li><a href="https://linux.die.net/man/8/stow">Stow Manual Page, section 8</a></li>



<li><a href="https://tamerlan.dev/how-i-manage-my-dotfiles-using-gnu-stow/">Tamerlan, How I manage my dotfiles using GNU Stow</a></li>
</ul>
]]></content>
		
					<link rel="replies" type="text/html" href="https://ikawnoclast.com/2025/05/19/my-approach-to-managing-dot-files-with-gnu-stow/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://ikawnoclast.com/2025/05/19/my-approach-to-managing-dot-files-with-gnu-stow/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
		<entry>
		<author>
			<name>ikawnoclast</name>
							<uri>https://ikawnoclast.com</uri>
						</author>

		<title type="html"><![CDATA[Scripting for Security Bash Course]]></title>
		<link rel="alternate" type="text/html" href="https://ikawnoclast.com/2023/03/09/scripting-for-security-bash-course/" />

		<id>http://ikawnoclast.com/?p=2741</id>
		<updated>2023-03-09T13:00:13Z</updated>
		<published>2023-03-09T13:00:13Z</published>
		<category scheme="https://ikawnoclast.com" term="training" /><category scheme="https://ikawnoclast.com" term="bash" /><category scheme="https://ikawnoclast.com" term="pluralsight" />
		<summary type="html"><![CDATA[I have a new course for security analysts on using GNU Bash in security operations on Pluralsight.]]></summary>

					<content type="html" xml:base="https://ikawnoclast.com/2023/03/09/scripting-for-security-bash-course/"><![CDATA[
<figure class="wp-block-image size-large has-custom-border"><a href="https://pluralsight.com"><img width="345" height="75" data-attachment-id="1782" data-permalink="https://ikawnoclast.com/2021/11/07/reconnaissance-with-spiderfoot-course/pluralsight-color-full-logo/" data-orig-file="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png" data-orig-size="345,75" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="pluralsight-color-full-logo" data-image-description="" data-image-caption="" data-medium-file="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png?w=300" data-large-file="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png?w=345" src="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png?w=345" alt="" class="wp-image-1782" style="border-style:none;border-width:0px" srcset="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png 345w, https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png?w=150 150w, https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png?w=300 300w" sizes="(max-width: 345px) 100vw, 345px" /></a></figure>



<p class="wp-block-paragraph">I have a new course available on <a rel="noopener" href="https://www.pluralsight.com/" target="_blank">Pluralsight</a>. It&#8217;s a security analyst focused tools on <a href="https://www.gnu.org/software/bash/">GNU Bash</a> and scripting. It is the first in a series of courses on Bash.</p>



<p class="wp-block-paragraph"><a href="https://app.pluralsight.com/library/courses/bash-security-scripting/table-of-contents">Scripting for Security with Bash</a> is a technical course for information security analysts that need to understand the UNIX and Linux environment and use Bash as their primary shell and scripting tool. It is designed to be a quick introduction and focused on demonstrating how to use Bash for security operations and automation. (<a href="https://app.pluralsight.com/course-player?clipId=172e054c-a0d8-4d86-9a9d-43805f1bbcc6" target="_blank" rel="noreferrer noopener">Course overview video</a>)</p>



<div class="wp-block-group is-layout-constrained wp-block-group-is-layout-constrained">
<span id="more-2741"></span>
</div>



<p class="wp-block-paragraph">In addition to understanding the detailed tasks associated with security operations, security analysts need a solid technical foundation. The role requires knowledge of systems that exists in their organization&#8217;s IT environment from desktops in offices, servers in far-away data centers, pervasive and distributed operational technology devices, and virtual machines in the cloud. Many of these systems are Linux distributions with installed with the Bash shell.</p>



<p class="wp-block-paragraph">GNU Bash is the Bourne-Again SHell, which has been the GNU Project&#8217;s shell since it was released in 1989. It was designed to replace the Bourne shell, which was released with Version 7 UNIX. Bash is the default shell for most Linux distributions. Scripting in Bash is a common way to automate tasks on UNIX and Linux systems. </p>



<p class="wp-block-paragraph">My course describes how to use Bash for security operations as a security analyst. I also show how to configure file permissions and ACLs, manage users and groups, use Secure Shell, and handle some security concerns with scripting. The Windows Subsystem for Linux (WSL) is a Microsoft-supported way to get Linux and Bash on your Windows system, so I show how to install and use WSL. There are seven separate demos included to show how to use Bash. I also included several scripts as examples.</p>



<h2 class="wp-block-heading" id="table-of-contents">Table of Contents</h2>



<ul class="wp-block-list">
<li>Bash Basics</li>



<li>Using Linux and Bash on Windows</li>



<li>Managing Security Concerns with Bash</li>



<li>Managing File Permissions</li>



<li>Managing Users and Groups</li>



<li>Running Commands Remotely</li>
</ul>



<p class="wp-block-paragraph">Please take a look and let me know your thoughts on this new course.</p>
]]></content>
		
					<link rel="replies" type="text/html" href="https://ikawnoclast.com/2023/03/09/scripting-for-security-bash-course/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://ikawnoclast.com/2023/03/09/scripting-for-security-bash-course/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
		<entry>
		<author>
			<name>ikawnoclast</name>
							<uri>https://ikawnoclast.com</uri>
						</author>

		<title type="html"><![CDATA[Reconnaissance with Spiderfoot Course]]></title>
		<link rel="alternate" type="text/html" href="https://ikawnoclast.com/2021/11/07/reconnaissance-with-spiderfoot-course/" />

		<id>http://ikawnoclast.com/?p=953</id>
		<updated>2022-11-23T00:10:21Z</updated>
		<published>2021-11-07T17:02:58Z</published>
		<category scheme="https://ikawnoclast.com" term="training" /><category scheme="https://ikawnoclast.com" term="penetration testing" /><category scheme="https://ikawnoclast.com" term="pluralsight" />
		<summary type="html"><![CDATA[I have a new course on using Spiderfoot in red team operations on Pluralsight.]]></summary>

					<content type="html" xml:base="https://ikawnoclast.com/2021/11/07/reconnaissance-with-spiderfoot-course/"><![CDATA[
<figure class="wp-block-image size-large has-custom-border"><a href="https://pluralsight.com"><img width="345" height="75" data-attachment-id="1782" data-permalink="https://ikawnoclast.com/2021/11/07/reconnaissance-with-spiderfoot-course/pluralsight-color-full-logo/" data-orig-file="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png" data-orig-size="345,75" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="pluralsight-color-full-logo" data-image-description="" data-image-caption="" data-medium-file="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png?w=300" data-large-file="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png?w=345" src="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png?w=345" alt="" class="wp-image-1782" style="border-style:none;border-width:0;" srcset="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png 345w, https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png?w=150 150w, https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png?w=300 300w" sizes="(max-width: 345px) 100vw, 345px" /></a></figure>



<p class="wp-block-paragraph">I have a new course available on <a rel="noopener" href="https://www.pluralsight.com/" target="_blank">Pluralsight</a>. It&#8217;s another Red Team Tools course focused course on <a href="https://www.spiderfoot.net/" target="_blank" rel="noreferrer noopener">Spiderfoot</a>. It is part of the Pluralsight <a rel="noopener" href="https://app.pluralsight.com/paths/skill/red-team-tools" target="_blank">Red Team Tools</a> learning path.</p>



<p class="wp-block-paragraph">While my other courses are a couple hours of content, the <a rel="noreferrer noopener" href="https://app.pluralsight.com/library/courses/reconnaissance-spiderfoot/table-of-contents" target="_blank">Reconnaissance with Spiderfoot</a> course is 38 minutes. It is designed to be a quick introduction and heavily focused on demonstrating how to use Spiderfoot for recon in red team engagements. (<a href="https://app.pluralsight.com/course-player?clipId=0b13d79e-3bc5-4ff1-9cd1-db9d3b044e12" target="_blank" rel="noreferrer noopener">Course overview video</a>)</p>



<div class="wp-block-group is-layout-constrained wp-block-group-is-layout-constrained">
<span id="more-953"></span>
</div>



<p class="wp-block-paragraph">Reconnaissance is the first step when starting a red team project. Information must be gathered for the the target organization, including specific details about its connected devices, network block assignments, domain names and subdomains, and even physical locations for some engagements.</p>



<p class="wp-block-paragraph">Spiderfoot is an open source intelligence automation platform. It utilizes more than 200 modules to gather information about reconnaissance targets. It uses an active intelligence gathering to directly interact and probe the target&#8217;s infrastructure. However, it&#8217;s real value is in its passive information gathering using a large variety of online open source intelligence sources.</p>



<p class="wp-block-paragraph">My course describes how to use Spiderfoot for the reconnaissance phase of a red team operation. There are five separate demos included to show how to use Spiderfoot.</p>



<h2 class="wp-block-heading" id="table-of-contents">Table of Contents</h2>



<ul class="wp-block-list">
<li>Using Spiderfoot for Reconnaissance</li>



<li>Access the Shodan Web Site</li>



<li>Starting Spiderfoot</li>



<li>Initiate a Scan</li>



<li>Configure Modules</li>



<li>Use the Command Line Interface</li>



<li>Use Spiderfoot as a Red Team</li>



<li>Resources</li>
</ul>



<p class="wp-block-paragraph">Please take a look and let me know your thoughts on this new course.</p>
]]></content>
		
					<link rel="replies" type="text/html" href="https://ikawnoclast.com/2021/11/07/reconnaissance-with-spiderfoot-course/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://ikawnoclast.com/2021/11/07/reconnaissance-with-spiderfoot-course/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
		<entry>
		<author>
			<name>ikawnoclast</name>
							<uri>https://ikawnoclast.com</uri>
						</author>

		<title type="html"><![CDATA[Reconnaissance with Shodan Course]]></title>
		<link rel="alternate" type="text/html" href="https://ikawnoclast.com/2021/07/12/reconnaissance-with-shodan-course/" />

		<id>http://ikawnoclast.com/?p=736</id>
		<updated>2022-11-23T00:10:58Z</updated>
		<published>2021-07-12T10:02:48Z</published>
		<category scheme="https://ikawnoclast.com" term="training" /><category scheme="https://ikawnoclast.com" term="penetration testing" /><category scheme="https://ikawnoclast.com" term="pluralsight" />
		<summary type="html"><![CDATA[I have a new course on using Shodan in red team operations on Pluralsight.]]></summary>

					<content type="html" xml:base="https://ikawnoclast.com/2021/07/12/reconnaissance-with-shodan-course/"><![CDATA[
<figure class="wp-block-image size-full"><a href="https://pluralsight.com"><img data-attachment-id="1782" data-permalink="https://ikawnoclast.com/2021/11/07/reconnaissance-with-spiderfoot-course/pluralsight-color-full-logo/" data-orig-file="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png" data-orig-size="345,75" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="pluralsight-color-full-logo" data-image-description="" data-image-caption="" data-medium-file="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png?w=300" data-large-file="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png?w=345" src="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png" alt="" class="wp-image-1782" /></a></figure>



<p class="wp-block-paragraph">I have a new course available on <a href="https://www.pluralsight.com/" target="_blank" rel="noopener">Pluralsight</a>. It&#8217;s a new type of course for me. My previous courses have been long-form courses. This one is shorter, tool-focused course on <a href="https://www.shodan.io/" target="_blank" rel="noopener">Shodan</a>. It is part of the Pluralsight <a href="https://app.pluralsight.com/paths/skill/red-team-tools" target="_blank" rel="noopener">Red Team Tools</a> learning path.</p>



<p class="wp-block-paragraph">While my other courses are a couple hours of content, the <a href="https://app.pluralsight.com/library/courses/reconnaissance-shodan/table-of-contents" target="_blank" rel="noopener">Reconnaissance with Shodan</a> course is 27 minutes. It is designed to be a quick introduction and heavily focused on demonstrating how to use Shodan for recon in red team engagements. (<a href="https://app.pluralsight.com/course-player?clipId=11371194-cb42-468f-be01-3b309b2fc14e" target="_blank" rel="noopener">Course overview video</a>)</p>



<div class="wp-block-group is-layout-constrained wp-block-group-is-layout-constrained">
<span id="more-736"></span>
</div>



<p class="wp-block-paragraph">Reconnaissance is the first step when starting a red team project. Information must be gathered for the the target organization, including specific details about its connected devices, network block assignments, domain names and subdomains, and even physical locations for some engagements.</p>



<p class="wp-block-paragraph">Shodan is a search engine for internet-connected devices, not for human-oriented web pages. Shodan crawls the internet and indexes information about servers, desktops, printers, SCADA devices, mobiles devices, surveillance cameras, and many other systems with an IP address. It is an easy tool to use, with both web and command line interfaces available.</p>



<p class="wp-block-paragraph">My course describes how to use Shodan for the reconnaissance phase of a red team operation. There are five separate demos included to show how to use Shodan.</p>



<h2 class="wp-block-heading">Table of Contents</h2>



<ul class="wp-block-list">
<li>Reconnaissance with Shodan</li>



<li>Access the Shodan Web Site</li>



<li>Utilize the Shodan Command Line Tool</li>



<li>Use Plain Text Banner Searches</li>



<li>Use Search Filters to Refine Results</li>



<li>Explore Red Team Scenarios</li>



<li>Resources</li>
</ul>



<p class="wp-block-paragraph">Please take a look and let me know your thoughts on this new course.</p>
]]></content>
		
					<link rel="replies" type="text/html" href="https://ikawnoclast.com/2021/07/12/reconnaissance-with-shodan-course/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://ikawnoclast.com/2021/07/12/reconnaissance-with-shodan-course/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
		<entry>
		<author>
			<name>ikawnoclast</name>
							<uri>https://ikawnoclast.com</uri>
						</author>

		<title type="html"><![CDATA[Metasploit: Getting Started Course]]></title>
		<link rel="alternate" type="text/html" href="https://ikawnoclast.com/2020/09/05/metasploit-getting-started-course/" />

		<id>http://ikawnoclast.com/?p=701</id>
		<updated>2022-11-23T00:11:35Z</updated>
		<published>2020-09-05T15:01:50Z</published>
		<category scheme="https://ikawnoclast.com" term="training" /><category scheme="https://ikawnoclast.com" term="information security" /><category scheme="https://ikawnoclast.com" term="pluralsight" />
		<summary type="html"><![CDATA[I have a new course on Pluralsight called Metasploit: Getting Started.]]></summary>

					<content type="html" xml:base="https://ikawnoclast.com/2020/09/05/metasploit-getting-started-course/"><![CDATA[
<figure class="wp-block-image size-full"><a href="https://pluralsight.com"><img data-attachment-id="1782" data-permalink="https://ikawnoclast.com/2021/11/07/reconnaissance-with-spiderfoot-course/pluralsight-color-full-logo/" data-orig-file="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png" data-orig-size="345,75" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="pluralsight-color-full-logo" data-image-description="" data-image-caption="" data-medium-file="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png?w=300" data-large-file="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png?w=345" src="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png" alt="" class="wp-image-1782" /></a></figure>



<p class="wp-block-paragraph">I have a new course available at <a href="https://www.pluralsight.com/">Pluralsight</a>. It&#8217;s an introduction to the Metasploit Framework. In it, I focus on getting started quickly with using the framework. It&#8217;s a relatively short course (for me) at approximately two hours of content, including demonstrations. The course is called <a href="http://app.pluralsight.com/library/courses/metasploit-getting-started">Metasploit: Getting Started</a>. (<a href="https://app.pluralsight.com/player?course=metasploit-getting-started&amp;author=keith-watson&amp;clip=0">Course Overview video</a>)</p>



<div class="wp-block-group is-layout-constrained wp-block-group-is-layout-constrained">
<span id="more-701"></span>
</div>



<p class="wp-block-paragraph">This new course takes some of the original concepts presented in my very first Pluralsight course, <a href="https://app.pluralsight.com/library/courses/metasploit-penetration-testing-introduction/table-of-contents">Introduction to Penetration Testing Using&nbsp; Metasploit</a>, and condenses it down to the essential information. It&#8217;s a style of course Pluralsight uses to get learners up to speed quickly on a new piece of software, platform, or service. Those type of courses focus on basic concepts and demonstrations to quick get the learner started. Later courses are used to expand their knowledge on more in-depth concepts and capabilities.</p>



<h2 class="wp-block-heading">Table of Contents</h2>



<ul class="wp-block-list">
<li>Penetration Testing Ethics and Processes</li>



<li>Metasploit Framework Capabilities</li>



<li>Metasploit Framework Architecture</li>



<li>Installing and Configuring the Metasploit Framework</li>



<li>Preparing an Attack</li>



<li>Launching an Attack</li>



<li>Working with the Metasploit Framework</li>



<li>Summary and Next Steps</li>
</ul>



<p class="wp-block-paragraph">I hope you will check it out. I look forward to feedback on it.</p>



<h2 class="wp-block-heading">Future Work</h2>



<p class="wp-block-paragraph">Since I left out a lot of information to keep the total length around two hours and the content focused on the primary subject matter, I am creating supplementary videos to address some of the missing topics and even cover some of the content in more depth. It will be similar to end notes and footnotes for a nonfiction book. Unfortunately, that type of content may be interesting to only 4 or 5 people in the world. However, I am creating it as something that I would love to have if I were the learner.</p>



<p class="wp-block-paragraph">There are a couple more courses on Metasploit and Meterpreter in the works, so stay tuned for details.</p>
]]></content>
		
					<link rel="replies" type="text/html" href="https://ikawnoclast.com/2020/09/05/metasploit-getting-started-course/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://ikawnoclast.com/2020/09/05/metasploit-getting-started-course/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
		<entry>
		<author>
			<name>ikawnoclast</name>
							<uri>https://ikawnoclast.com</uri>
						</author>

		<title type="html"><![CDATA[Introduction to Information Security Course]]></title>
		<link rel="alternate" type="text/html" href="https://ikawnoclast.com/2018/09/04/introduction-to-information-security/" />

		<id>http://ikawnoclast.com/?p=648</id>
		<updated>2022-11-23T00:12:06Z</updated>
		<published>2018-09-04T21:33:30Z</published>
		<category scheme="https://ikawnoclast.com" term="training" /><category scheme="https://ikawnoclast.com" term="information security" /><category scheme="https://ikawnoclast.com" term="pluralsight" />
		<summary type="html"><![CDATA[I completed and published another course with&#160;Pluralsight. This time I was asked to create an introductory course for information security. It had to be high level. It had to be accessible to beginners that have little to no background in information security. It is the lead course in the&#160;Survey of Information Security&#160;learning path. This path [&#8230;]]]></summary>

					<content type="html" xml:base="https://ikawnoclast.com/2018/09/04/introduction-to-information-security/"><![CDATA[
<figure class="wp-block-image size-full wp-image-568 size-medium"><a href="https://pluralsight.com"><img data-attachment-id="1782" data-permalink="https://ikawnoclast.com/2021/11/07/reconnaissance-with-spiderfoot-course/pluralsight-color-full-logo/" data-orig-file="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png" data-orig-size="345,75" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="pluralsight-color-full-logo" data-image-description="" data-image-caption="" data-medium-file="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png?w=300" data-large-file="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png?w=345" src="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png" alt="" class="wp-image-1782" /></a></figure>



<p class="wp-block-paragraph">I completed and published another <a href="https://app.pluralsight.com/library/courses/information-security-introduction/table-of-contents">course</a> with&nbsp;<a href="https://www.pluralsight.com/" target="_blank" rel="noopener noreferrer">Pluralsight</a>. This time I was asked to create an introductory course for information security. It had to be high level. It had to be accessible to beginners that have little to no background in information security.</p>



<p class="wp-block-paragraph">It is the lead course in the&nbsp;<a href="https://app.pluralsight.com/paths/skill/survey-of-information-security-skill" target="_blank" rel="noopener noreferrer">Survey of Information Security</a>&nbsp;learning path. This path also contains my second penetration testing course,&nbsp;<a href="https://ikawnoclast.com/training/penetration-testing-big-picture/" target="_blank" rel="noopener noreferrer">Penetration Testing: The Big Picture</a>.</p>



<p class="wp-block-paragraph">The objective of this course is to assist learners in understanding the foundational principles and the key concepts in security. I describe most of the program and management approaches from an organizational perspective. I used this method specifically so that learners can apply this knowledge to their current job and their organization.</p>



<div class="wp-block-group is-layout-constrained wp-block-group-is-layout-constrained">
<span id="more-648"></span>
</div>



<h1 class="wp-block-heading">Course Description</h1>



<p class="wp-block-paragraph">There are many components to an organization&#8217;s information security program. If you are new to cybersecurity or interested in getting started, it can be difficult to identify and understand all of the facets of protecting an organization&#8217;s information assets. In this course, you will learn about the information security programs used by organizations. First, you&#8217;ll learn about the foundational principles of security, such as confidentiality, integrity, governance, risk management, and compliance. Next, you will learn about organizational assets and how they are protected through the use of security controls. Then, you will learn about how auditing, monitoring, and testing is used to review and evaluate the effectiveness of those security controls. Finally, you will explore how organizations manage and prepare for security incidents, disruptions, and disasters and how they manage the day-to-day operations of a program. When you finish this course, you will have the knowledge and understanding of the bigger picture of information security.</p>



<h1 class="wp-block-heading">Table of Contents</h1>



<ul class="wp-block-list">
<li>Course Overview</li>



<li>Security Principles, Governance, Risk, and Compliance</li>



<li>Protecting and Defending Assets</li>



<li>Auditing and Monitoring</li>



<li>Managing Incidents and Operations</li>
</ul>



<h1 class="wp-block-heading">What is the Learning Path?</h1>



<p class="wp-block-paragraph">This learning path is a specific set of Pluralsight courses on information security. These are Big Picture courses since they provide a wide survey (i.e. &#8220;big picture&#8221;) of relevant content in security. They are not in-depth courses but introductory ones.</p>



<h1 class="wp-block-heading">Links</h1>



<ul class="wp-block-list">
<li><a href="http://pluralsight.com/" target="_blank" rel="noopener noreferrer">Pluralsight</a></li>



<li><a href="https://app.pluralsight.com/library/courses/information-security-introduction/table-of-contents" target="_blank" rel="noopener noreferrer">Introduction to Information Security</a> (Pluralsight course)</li>
</ul>
]]></content>
		
					<link rel="replies" type="text/html" href="https://ikawnoclast.com/2018/09/04/introduction-to-information-security/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://ikawnoclast.com/2018/09/04/introduction-to-information-security/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
		<entry>
		<author>
			<name>ikawnoclast</name>
							<uri>https://ikawnoclast.com</uri>
						</author>

		<title type="html"><![CDATA[Penetration Testing: The Big Picture Course]]></title>
		<link rel="alternate" type="text/html" href="https://ikawnoclast.com/2017/10/30/penetration-testing-big-picture/" />

		<id>http://ikawnoclast.com/?p=621</id>
		<updated>2022-11-23T00:00:55Z</updated>
		<published>2017-10-30T13:15:06Z</published>
		<category scheme="https://ikawnoclast.com" term="training" /><category scheme="https://ikawnoclast.com" term="penetration testing" /><category scheme="https://ikawnoclast.com" term="pluralsight" />
		<summary type="html"><![CDATA[I have another Pluralsight&#160;course published. Still focusing on penetration testing, I was asked to create a high level overview course on the subject. Penetration Testing: The Big Picture&#160;was published on October 6, 2017 and looks at a wide variety of topics on penetration testing. The focus in this course is to present information about pen [&#8230;]]]></summary>

					<content type="html" xml:base="https://ikawnoclast.com/2017/10/30/penetration-testing-big-picture/"><![CDATA[
<figure class="wp-block-image size-full"><a href="https://pluralsight.com"><img data-attachment-id="1782" data-permalink="https://ikawnoclast.com/2021/11/07/reconnaissance-with-spiderfoot-course/pluralsight-color-full-logo/" data-orig-file="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png" data-orig-size="345,75" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="pluralsight-color-full-logo" data-image-description="" data-image-caption="" data-medium-file="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png?w=300" data-large-file="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png?w=345" src="https://ikawnoclast.com/wp-content/uploads/2022/11/pluralsight-color-full-logo.png" alt="" class="wp-image-1782" /></a></figure>



<p class="wp-block-paragraph">I have another <a href="https://www.pluralsight.com/">Pluralsight</a>&nbsp;course published. Still focusing on penetration testing, I was asked to create a high level overview course on the subject. <a href="https://app.pluralsight.com/library/courses/penetration-testing-big-picture/table-of-contents">Penetration Testing: The Big Picture</a>&nbsp;was published on October 6, 2017 and looks at a wide variety of topics on penetration testing.</p>



<p class="wp-block-paragraph">The focus in this course is to present information about pen testing that would be useful to those interested in learning more about it as a career option or training direction. It can also be useful for individuals and organizations interested in hiring pen testers or organizations seeking pen testing services.</p>



<div class="wp-block-group is-layout-constrained wp-block-group-is-layout-constrained">
<span id="more-621"></span>
</div>



<p class="wp-block-paragraph">This course is more more of an overview than my first course <a href="https://ikawnoclast.com/training/introduction-penetration-testing-using-metasploit/">Introduction to Penetration Testing Using Metasploit</a>.</p>



<h1 class="wp-block-heading">Course Description</h1>



<p class="wp-block-paragraph">As more businesses create, collect, and manage large volumes of customer data and provide access to that data through mobile apps, the Web, and IoT devices, there are more opportunities for that data to be compromised and stolen by nefarious individuals, criminal groups, and even governments. Organizations are struggling to improve the accessibility to and increase the value of their intellectual property while simultaneously protecting it from unauthorized exposure. As news in the past few years has shown, this is a significant challenge and many organizations lost control over their customer&#8217;s data and their own intellectual property. Penetration testing is one technique that organizations use to find and correct weaknesses in their network and systems before someone else does. First, you will learn how penetration testing serves as key component in an organization&#8217;s information security management program. Next, you will learn about the penetration testing process and techniques used to discover and exploit vulnerabilities. Finally, you will have a good understanding of the software tools, certifications, and other courses that can help you build your technical skills. When you finish this course, you will have the knowledge of how penetration testing is used to improve the security of a network and the techniques and tools used to conduct the testing.</p>



<h1 class="wp-block-heading">Table of Contents</h1>



<ul class="wp-block-list">
<li>Course Overview</li>



<li>The Role of Penetration Testing in Security Testing</li>



<li>Penetration Tests</li>



<li>Penetration Testing Execution Standard (PTES)</li>



<li>Penetration Testers and Their Tools</li>
</ul>



<h1 class="wp-block-heading">Why Another Penetration Testing Course?</h1>



<p class="wp-block-paragraph">Most pen testing courses that I have reviewed focus on specific tools or a very narrow aspect of penetration testing. This course is intended to provide a wide overview of penetration testing showing how it is a part of security testing and how that applies to an organization&#8217;s information security management program. We also dive into the various types of tests from network focused testing to social engineering and up to physical testing (i.e. red teams).</p>



<h1 class="wp-block-heading">Why the Penetration Testing Execution Standard?</h1>



<p class="wp-block-paragraph">This maybe a little more controversial. However, there isn&#8217;t a formal standard on penetration testing. There several documents describing pen testing in standards such as the <a href="https://www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance_March_2015.pdf">PCI-DSS</a> and NIST <a href="http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-115.pdf">Special Publications 800-115</a>. The <a href="http://www.pentest-standard.org/index.php/Main_Page">Penetration Testing Execution Standard</a> (or PTES) is an informal document, or more accurately a wiki page, that describes a lot of the aspects of a consulting engagement from starting the business relationship to the actual testing phases and final reporting. The PTES serves as a living document that can change over time as the field changes.</p>



<p class="wp-block-paragraph">The PTES certainly needs some work in terms of organization of topics and editing. However, it serves as a good foundational document for the field to build on.</p>



<h1 class="wp-block-heading">Links</h1>



<ul class="wp-block-list">
<li><a href="http://pluralsight.com/">Pluralsight</a></li>



<li><a href="https://app.pluralsight.com/library/courses/penetration-testing-big-picture/table-of-contents">Penetration Testing: The Big Picture</a> (Pluralsight course)</li>
</ul>
]]></content>
		
					<link rel="replies" type="text/html" href="https://ikawnoclast.com/2017/10/30/penetration-testing-big-picture/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://ikawnoclast.com/2017/10/30/penetration-testing-big-picture/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
		<entry>
		<author>
			<name>ikawnoclast</name>
							<uri>https://ikawnoclast.com</uri>
						</author>

		<title type="html"><![CDATA[Kali Linux Changes for the Introduction to Penetration Testing Using Metasploit Course]]></title>
		<link rel="alternate" type="text/html" href="https://ikawnoclast.com/2016/12/30/kali-changes-intro-pen-testing-using-metasploit-course/" />

		<id>http://ikawnoclast.com/?p=590</id>
		<updated>2022-11-23T00:12:38Z</updated>
		<published>2016-12-30T14:11:11Z</published>
		<category scheme="https://ikawnoclast.com" term="training" /><category scheme="https://ikawnoclast.com" term="course" /><category scheme="https://ikawnoclast.com" term="metasploit" /><category scheme="https://ikawnoclast.com" term="pluralsight" />
		<summary type="html"><![CDATA[I developed the Pluralsight course Introduction to Penetration Testing Using Metasploit&#160;using Kali Linux, which is a project from Offensive Security. Kali&#160;is a Linux distribution with most of the tools an information security professional would need. It is also a great platform for designing&#160;courses around because&#160;most, if not all, of the tools needed are installed by [&#8230;]]]></summary>

					<content type="html" xml:base="https://ikawnoclast.com/2016/12/30/kali-changes-intro-pen-testing-using-metasploit-course/"><![CDATA[
<figure class="wp-block-image"><a href="https://ikawnoclast.com/wp-content/uploads/2021/06/88ba6-offsec-projects-600x600-kali1.png"><img data-attachment-id="599" data-permalink="https://ikawnoclast.com/2016/12/30/kali-changes-intro-pen-testing-using-metasploit-course/offsec-projects-600x600-kali1/" data-orig-file="https://ikawnoclast.com/wp-content/uploads/2021/06/88ba6-offsec-projects-600x600-kali1.png" data-orig-size="600,600" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Offensive Security&amp;#8217;s Kali Linux" data-image-description="" data-image-caption="" data-medium-file="https://ikawnoclast.com/wp-content/uploads/2021/06/88ba6-offsec-projects-600x600-kali1.png?w=300" data-large-file="https://ikawnoclast.com/wp-content/uploads/2021/06/88ba6-offsec-projects-600x600-kali1.png?w=600" src="https://ikawnoclast.com/wp-content/uploads/2021/06/88ba6-offsec-projects-600x600-kali1.png?w=300&amp;h=300" alt="" class="wp-image-599" srcset="https://ikawnoclast.com/wp-content/uploads/2021/06/88ba6-offsec-projects-600x600-kali1.png?w=300&amp;h=300 300w, https://ikawnoclast.com/wp-content/uploads/2021/06/88ba6-offsec-projects-600x600-kali1.png?w=150&amp;h=150 150w, https://ikawnoclast.com/wp-content/uploads/2021/06/88ba6-offsec-projects-600x600-kali1.png 600w" sizes="(max-width: 300px) 100vw, 300px" /></a></figure>



<p class="wp-block-paragraph">I developed the <a href="http://pluralsight.com">Pluralsight</a> course <a href="https://app.pluralsight.com/library/courses/metasploit-penetration-testing-introduction/table-of-contents">Introduction to Penetration Testing Using Metasploit</a>&nbsp;using <a href="http://kali.org">Kali Linux</a>, which is a project from <a href="https://www.offensive-security.com/">Offensive Security</a>. Kali&nbsp;is a Linux distribution with most of the tools an information security professional would need. It is also a great platform for designing&nbsp;courses around because&nbsp;most, if not all, of the tools needed are installed by default.</p>



<p class="wp-block-paragraph">The challenge is that Kali&nbsp;changes over time. Most of the times those changes are good and necessary to stay current and relevant. Of course, those changes often&nbsp;negatively impact ancillary products and information resources, including instructional courses. My Metasploit course is no exception. Revising an existing course that is already in use has its own challenges. Instead, I offer this blog post as a &#8220;living document&#8221; highlighting&nbsp;changes in Kali Linux that impact my Metasploit course. My hope is that if you run into issues with the course due to changes in Kali, you can find the answers here.</p>



<div class="wp-block-group is-layout-constrained wp-block-group-is-layout-constrained">
<span id="more-590"></span>
</div>



<h1 class="wp-block-heading">Kali Linux&nbsp;Rolls On</h1>



<p class="wp-block-paragraph">The Introduction to Penetration Testing Using Metasploit course was developed using Kali Linux 2.0. Unfortunately, I am not the fastest course creator. When the course was released by Pluralsight in June 2016, Kali Linux had&nbsp;switched to a <a href="https://www.kali.org/releases/kali-linux-rolling-edition-2016-1/">rolling release model</a>&nbsp;five months earlier. The benefits to the security practitioner were tremendous. To my&nbsp;course and students&#8230;not so much.</p>



<p class="wp-block-paragraph">A rolling release is an approach to operating system distribution release management that relies on a continuous stream of updated and tested packages instead of a single release of packages at a specific point in time. Kali Linux is based on <a href="http://www.debian.org">Debian</a>, one of the older and more stable Linux distributions. Debian is continually updating software packages and those &#8220;trickle-down&#8221; into Kali rather quickly. This means that the Kali Rolling Releases will also have a lot of updated packages appear several times a week. For the most part, these package updates fix bug and security issues. However, those updates can also introduce new issues sometimes.</p>



<p class="wp-block-paragraph">Overall, the Kali Rolling Release distribution model helps us, and I have no complaints about it.</p>



<p class="wp-block-paragraph">Some of the issues that I and some students uncovered are related to updated packages. One issue occurs because a major tool was removed from the new Kali distribution entirely. I have noted the known&nbsp;course issues that have arisen in the new distribution of Kali Linux below along with solutions. The course remains relevant, and these notes should help you complete the course without significant tool problems.</p>



<p class="wp-block-paragraph">I hope this helps!</p>



<h2 class="wp-block-heading">Package Upgrade Notes</h2>



<p class="wp-block-paragraph">In the course, I have you&nbsp;run <code>apt-get dist-upgrade</code> and then proceed with the installation and configuration of the system. In the Kali Rolling Releases, the package upgrade process installs a new major version of the Linux kernel. There is a version number difference between the running kernel (the one the system started up with) and the kernel installed in the upgrade process. This causes issues later when you&nbsp;need to install the kernel header files package because the command used (<code>uname -r</code>) lists the running kernel version and not the new one that was just installed.</p>



<p class="wp-block-paragraph">To overcome this problem, just reboot the system after installing the upgraded packages. The system will boot with the new Linux kernel and the header file version mismatch goes away.</p>



<p class="wp-block-paragraph">There are also older software packages that are no longer needed once the system software packages are upgraded. Use the <code>apt-get autoremove</code> command to clean those software packages out.</p>



<p class="wp-block-paragraph">Here is the command order:</p>



<pre class="wp-block-preformatted"># apt-get update
# apt-get dist-upgrade 
# apt-get autoremove 
# reboot</pre>



<p class="wp-block-paragraph">Once the system comes back up, you can continue with the installation of VirtualBox Guest Additions and kernel header files.</p>



<h2 class="wp-block-heading">OpenVAS</h2>



<p class="wp-block-paragraph">The biggest&nbsp;change that I noted in the Rolling Releases of Kali is <a href="http://www.openvas.org/">OpenVAS</a> is missing. OpenVAS is the Open Vulnerability Assessment System that we use in the course to find and identify vulnerabilities in target systems. It is gone from the base Kali Rolling Releases, but it can be easily added. Before you are ready to start the configuration of OpenVAS, install the OpenVAS software packages&nbsp;and its dependencies. It&#8217;s just one command thankfully.</p>



<pre class="wp-block-preformatted"># apt-get install openvas</pre>



<p class="wp-block-paragraph">After determining all of the software packages that will need to be installed, <code>apt-get</code> will ask whether you want to proceed with the installation. Type a &#8216;<code>y</code>&#8216; for &#8220;yes&#8221; to proceed.</p>



<p class="wp-block-paragraph">The installation will also display the following query related to the <code>openvas-scanner</code> package and the <a href="https://redis.io/">REDIS</a> database configuration:</p>



<figure class="wp-block-image alignnone"><a href="https://ikawnoclast.com/wp-content/uploads/2021/06/9df72-80ae2303-0693-4a7a-8229-9d36ff957770.png"><img data-attachment-id="594" data-permalink="https://ikawnoclast.com/2016/12/30/kali-changes-intro-pen-testing-using-metasploit-course/80ae2303-0693-4a7a-8229-9d36ff957770/" data-orig-file="https://ikawnoclast.com/wp-content/uploads/2021/06/9df72-80ae2303-0693-4a7a-8229-9d36ff957770.png" data-orig-size="746,388" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="openvas-scanner-redis-query" data-image-description="" data-image-caption="&lt;p&gt;Query displayed when installing OpenVAS.&lt;/p&gt;
" data-medium-file="https://ikawnoclast.com/wp-content/uploads/2021/06/9df72-80ae2303-0693-4a7a-8229-9d36ff957770.png?w=300" data-large-file="https://ikawnoclast.com/wp-content/uploads/2021/06/9df72-80ae2303-0693-4a7a-8229-9d36ff957770.png?w=746" src="https://ikawnoclast.com/wp-content/uploads/2021/06/9df72-80ae2303-0693-4a7a-8229-9d36ff957770.png?w=300&amp;h=156" alt="" class="wp-image-594" srcset="https://ikawnoclast.com/wp-content/uploads/2021/06/9df72-80ae2303-0693-4a7a-8229-9d36ff957770.png?w=300&amp;h=156 300w, https://ikawnoclast.com/wp-content/uploads/2021/06/9df72-80ae2303-0693-4a7a-8229-9d36ff957770.png?w=600&amp;h=312 600w, https://ikawnoclast.com/wp-content/uploads/2021/06/9df72-80ae2303-0693-4a7a-8229-9d36ff957770.png?w=150&amp;h=78 150w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption class="wp-element-caption">Query displayed when installing OpenVAS.</figcaption></figure>



<p class="wp-block-paragraph">Select the &#8220;<code>&lt;YES&gt;</code>&#8221; answer and hit return.</p>



<p class="wp-block-paragraph">Once <code>apt-get</code> completes the installation of packages, OpenVAS is installed and you can proceed with the initial configuration of OpenVAS using the instructions in the course.</p>



<p class="wp-block-paragraph">I have not yet found the reasons that OpenVAS has been removed from the Kali Rolling Releases. If you know, please tell me.</p>



<h2 class="wp-block-heading">PostgreSQL</h2>



<p class="wp-block-paragraph">When all of the software packages are upgraded, you will encounter a warning that looks like the following:</p>



<figure class="wp-block-image alignnone"><a href="https://ikawnoclast.com/wp-content/uploads/2021/06/56f89-postgresql-warning.png"><img data-attachment-id="595" data-permalink="https://ikawnoclast.com/2016/12/30/kali-changes-intro-pen-testing-using-metasploit-course/postgresql-warning/" data-orig-file="https://ikawnoclast.com/wp-content/uploads/2021/06/56f89-postgresql-warning.png" data-orig-size="1024,811" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="postgresql-warning" data-image-description="" data-image-caption="&lt;p&gt;Warning message for PostgreSQL&lt;/p&gt;
" data-medium-file="https://ikawnoclast.com/wp-content/uploads/2021/06/56f89-postgresql-warning.png?w=300" data-large-file="https://ikawnoclast.com/wp-content/uploads/2021/06/56f89-postgresql-warning.png?w=1024" src="https://ikawnoclast.com/wp-content/uploads/2021/06/56f89-postgresql-warning.png?w=300&amp;h=238" alt="" class="wp-image-595" srcset="https://ikawnoclast.com/wp-content/uploads/2021/06/56f89-postgresql-warning.png?w=300&amp;h=238 300w, https://ikawnoclast.com/wp-content/uploads/2021/06/56f89-postgresql-warning.png?w=600&amp;h=475 600w, https://ikawnoclast.com/wp-content/uploads/2021/06/56f89-postgresql-warning.png?w=150&amp;h=119 150w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption class="wp-element-caption">Warning message for PostgreSQL</figcaption></figure>



<p class="wp-block-paragraph">The message indicates that there are two major versions of <a href="https://www.postgresql.org/">PostgreSQL</a> installed and that there could be conflicts. The message suggests upgrading the 9.5 PostgreSQL database instances to version 9.6 and removing the PostgreSQL 9.5 software packages.</p>



<p class="wp-block-paragraph">For the purposes of the course though, PostgreSQL works just fine without changes. Ignore this warning and continue with the Metasploit database configuration as&nbsp;described in the course.</p>



<p class="wp-block-paragraph">If you are building a full pen test workstation for regular use, follow the&nbsp;instructions in the warning message.</p>



<h2 class="wp-block-heading">Other Issues?</h2>



<p class="wp-block-paragraph">These are the issues that I have found and fixed so far. There may be others that you find while using the course. If so, <a href="https://ikawnoclast.com/contact/">please let me know</a>.</p>
]]></content>
		
					<link rel="replies" type="text/html" href="https://ikawnoclast.com/2016/12/30/kali-changes-intro-pen-testing-using-metasploit-course/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://ikawnoclast.com/2016/12/30/kali-changes-intro-pen-testing-using-metasploit-course/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
		<entry>
		<author>
			<name>ikawnoclast</name>
							<uri>https://ikawnoclast.com</uri>
						</author>

		<title type="html"><![CDATA[Metasploit and Pentest Discussion on Test Talks Podcast]]></title>
		<link rel="alternate" type="text/html" href="https://ikawnoclast.com/2016/09/21/metasploit-and-pentest-discussion-on-test-talks-podcast/" />

		<id>http://ikawnoclast.com/?p=577</id>
		<updated>2022-11-23T00:00:09Z</updated>
		<published>2016-09-21T10:29:48Z</published>
		<category scheme="https://ikawnoclast.com" term="security" /><category scheme="https://ikawnoclast.com" term="training" />
		<summary type="html"><![CDATA[Joe Colantonio and I had a conversation about penetration testing and the use of Metasploit on the Test Talks Podcast. That episode is available now. Joe is a fellow Pluralsight Author and host of the Test Talks Podcast, which is a weekly podcast all about software test automation. We discussed concepts in penetration testing, Metasploit [&#8230;]]]></summary>

					<content type="html" xml:base="https://ikawnoclast.com/2016/09/21/metasploit-and-pentest-discussion-on-test-talks-podcast/"><![CDATA[
<figure class="wp-block-image"><a href="https://joecolantonio.com/testtalks/120-penetration-testing-using-metasploit-keith-watson/"><img data-attachment-id="583" data-permalink="https://ikawnoclast.com/2016/09/21/metasploit-and-pentest-discussion-on-test-talks-podcast/testtalks/" data-orig-file="https://ikawnoclast.com/wp-content/uploads/2021/06/390d5-testtalks.png" data-orig-size="161,150" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Test Talks" data-image-description="" data-image-caption="" data-medium-file="https://ikawnoclast.com/wp-content/uploads/2021/06/390d5-testtalks.png?w=161" data-large-file="https://ikawnoclast.com/wp-content/uploads/2021/06/390d5-testtalks.png?w=161" src="https://ikawnoclast.com/wp-content/uploads/2021/06/390d5-testtalks.png" alt="Test Talks" class="wp-image-583" /></a></figure>



<p class="wp-block-paragraph"><a href="https://www.joecolantonio.com/">Joe Colantonio</a> and I had a conversation about penetration testing and the use of <a href="https://metasploit.com/">Metasploit</a> on the <a href="https://joecolantonio.com/testtalks/">Test Talks Podcast</a>. That <a href="https://joecolantonio.com/testtalks/120-penetration-testing-using-metasploit-keith-watson/">episode</a> is available now.</p>



<p class="wp-block-paragraph">Joe is a fellow <a href="http://pluralsight.com/">Pluralsight</a> Author and host of the Test Talks Podcast, which is a weekly podcast all about software test automation.</p>



<p class="wp-block-paragraph">We discussed concepts in penetration testing, Metasploit and its auxiliary modules and OpenVAS for vulnerability scanning, Meterpreter for post-exploitation activities, ethics in the use of tools like Metasploit, and Kali Linux.</p>



<p class="wp-block-paragraph">Check out this episode and other episodes from Joe Colantonio and the Test Talks Podcast.</p>
]]></content>
		
					<link rel="replies" type="text/html" href="https://ikawnoclast.com/2016/09/21/metasploit-and-pentest-discussion-on-test-talks-podcast/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://ikawnoclast.com/2016/09/21/metasploit-and-pentest-discussion-on-test-talks-podcast/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
	</feed>
