Interfacing between technophile and technophobe


Note: This is my personal website, and any views or opinions expressed on it are my own. Those views or opinions are not necessarily endorsed or supported by any police service I have been employed by: past, present or future.

I spent over 18 years in UK law enforcement, investigating numerous offences including fraud, domestic violence, terrorism, dark web and indecent images. In the latter part of my career, I provided cyber security advice to small and medium enterprise. I’m now a Senior Cyber Security Consultant in the private sector, and hold the ISACA Certified Information Security Manager (CISM) accreditation.

The majority of my technical knowledge is self-taught. My articles are not solely based on my cybersecurity qualifications, but on years of experience in responding when bad things happen to good people, helping them to pick up the pieces, figuring out the why and the how, trying to ensure that bad things don’t happen again and using what I’ve observed to try and stop the same bad things happening to other good people.

Thanks for dropping by.

Mr N00b0t

2 thoughts on “About

    1. Hi Arpad, it’s a while since I did this challenge. I don’t want to give it away completely as I think you’re on the right track! Make sure you identify the injectable parameter correctly and then go back over the lessons. Is there something you can find out about the type of webserver and where it stores and processes certain information? Don’t waste effort attempting a shell – you’re looking for file disclosure (a flag) so stick to basic commands and explore the file system. I found this quite tough but I did get there in the end and I think you will too. Good luck!


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: