Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
News
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/c6/69/cc/c669cc1e-30b6-2ee8-57a2-1a356338f475/mza_5498275658329189582.jpg/600x600bb.jpg
Learn As I Learn - Technology, Product and Cybersecurity
Akanksha Pathak
57 episodes
4 days ago
No time to learn? Take out few minutes from your life and learn new things every day! Please subscribe to start learning for FREE now!
Show more...
Education
RSS
All content for Learn As I Learn - Technology, Product and Cybersecurity is the property of Akanksha Pathak and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
No time to learn? Take out few minutes from your life and learn new things every day! Please subscribe to start learning for FREE now!
Show more...
Education
Episodes (20/57)
Learn As I Learn - Technology, Product and Cybersecurity
Series 4: Ep 7: Debugging Your Code

Don't let errors stop you! This episode focuses on practical debugging techniques for both PowerShell and Bash scripts. We'll intentionally introduce common errors (like typos or wrong parameters) and walk through how to identify and fix them, building crucial troubleshooting skills.


Powershell Script:

#Script to log multiple event IDs
$BeginTime = (Get-Date).AddMinutes(-20)
Get-EventLog -LogName "Securityy" -After $BeginTime |
Where-Object { $_.EventID -in '4624', '4625'} |
Select-Object TimeGenerated, EventID, Message |
Format-Table -AutoSize |
Out-Files C:\EventLogs_MultipleEvents.txt


BASH Script:

#!/bin/bash
#Variables
USERNAME="testuser" # User accountname
PASSWORD="P@ssw0rd" # User password
GROUP="testgroup" # Custom groupname
SSH_DIR="/home/$USERNAME/.ssh"
PUB_KEY="ssh-rsa AAAAB3...your-public-key... user@kali"

#Step 1: Check ifuser already exists
if id "$USERNAME" &>/dev/null; then
  echo "Error: User '$USERNAME'already exists!"
  exit 1
fi

#Step 2: Create userand set password
echo "Creating user '$USERNAME'..."
useradd -m -n -s /bin/bash "$USERNAME" # Error 1: -n is an invalidoption
if [ $? -ne 0 ]; then
  echo "Error: Failed to create user'$USERNAME'"
  exit 1
fi
echo "$USERNAME:$PASSWORD" | chpasswd
echo "Password set for user '$USERNAME'."

#Step 3: Add user tosudoers
echo "Granting sudo access to '$USERNAME'..."
usermod -aG sudo "$USERNAME"
if [ $? -ne 0 ]; then
  echo "Error: Failed to add'$USERNAME' to sudoers"
  exit 1
fi

#Step 4: Createcustom group and add user
echo "Creating group '$GROUP' and adding user..."
groupadd "$GROUP" 2>/dev/null
usermod -aG "wronggroup" "$USERNAME" # Error 2:"wronggroup" does not exist
if [ $? -ne 0 ]; then
  echo "Error: Failed to add'$USERNAME' to group '$GROUP'"
  exit 1
fi

#Step 5: Setup SSHkey-based authentication
echo "Setting up SSH key-based authentication..."
mkdir -p "$SSH_DIR"
echo "$PUB_KEY" > "$SSH_DIR/authorized_keys"
chmod 600 "$SSH_DIR/authorized_keys"
chmod 700 "$SSH_DIR"
chown -R "$USERNAME:$USERNAME" "$SSH_DIR"
if [ $? -ne 0 ]; then
  echo "Error: Failed to set up SSHkeys"
  exit 1
fi
echo "SSH keys configured for '$USERNAME'."

#Step 6: Setpassword expiry to 30 days
echo "Setting password expiry policy for '$USERNAME'..."
chage -M 30 "$USERNAME"
if [ $? -ne 0 ]; then
  echo "Error: Failed to setpassword expiry"
  exit 1
fi

#Step 7: Logactivity to/var/log/user_setup.log
LOG_FILE="/var/log/user_setup.log"
echo "$(date) - User '$USERNAME' created and configured" >>"$LOG_FILE"
if [ $? -ne 0 ]; then
  echo "Error: Failed to write logto $LOG_FILE"
  exit 1
fi

#Step 8:Confirmation Message
echo "Testing SSH connection to '$USERNAME'@localhosts..."
ssh "$USERNAME@localhost"
if [ $? -ne 0 ]; then
echo "Error: SSH connection failed."
exit 1
fi
echo "User '$USERNAME' created and configured successfully!"

Show more...
4 days ago
9 minutes 5 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 4: Ep 6: Bash Scripting Essentials

Master automation in Linux with Bash scripts! Discover how to create and debug scripts for user setup, including creating new users, setting passwords, adding them to groups, configuring SSH key-based login, and setting password expiry. We’ll also cover testing and verification.

Script:

#!/bin/bash
#Variables
USERNAME="Jason" # User account name
PASSWORD="P@ssw0rd" # User password
GROUP="developers" # Custom group name
SSH_DIR="/home/$USERNAME/.ssh"
PUB_KEY="ssh-rsa AAAAB3...your-public-key... user@kali" # Replace with your actual public key

#Step 1: Check if user already exists
if id "$USERNAME" &>/dev/null; then
  echo "Error: User '$USERNAME' already exists!"
  exit 1
fi

#Step 2: Create user and set password
echo "Creating user '$USERNAME'..."
useradd -m -s /bin/bash "$USERNAME"
if [ $? -ne 0 ]; then
  echo "Error: Failed to create user '$USERNAME'"
  exit 1
fi
echo "$USERNAME:$PASSWORD" | chpasswd
echo "Password set for user '$USERNAME'."

#Step 3: Add user to sudoers
echo "Granting sudo access to '$USERNAME'..."
usermod -aG sudo "$USERNAME"
if [ $? -ne 0 ]; then
  echo "Error: Failed to add '$USERNAME' to sudoers"
  exit 1
fi

#Step 4: Create custom group and add user
echo "Creating group '$GROUP' and adding user..."
groupadd "$GROUP" 2>/dev/null
usermod -aG "$GROUP" "$USERNAME"
if [ $? -ne 0 ]; then
  echo "Error: Failed to add '$USERNAME' to group '$GROUP'"
  exit 1
fi

#Step 5: Setup SSH key-based authentication
echo "Setting up SSH key-based authentication..."
mkdir -p "$SSH_DIR"
echo "$PUB_KEY" > "$SSH_DIR/authorized_keys"
chmod 600 "$SSH_DIR/authorized_keys"
chmod 700 "$SSH_DIR"
chown -R "$USERNAME:$USERNAME" "$SSH_DIR"
if [ $? -ne 0 ]; then
  echo "Error: Failed to set up SSH keys"
  exit 1
fi
echo "SSH keys configured for '$USERNAME'."

#Step 6: Set password expiry to 30 days
echo "Setting password expiry policy for '$USERNAME'..."
chage -M 30 "$USERNAME"
if [ $? -ne 0 ]; then
  echo "Error: Failed to set password expiry"
  exit 1
fi

#Step 7: Log activity to /var/log/user_setup.log
LOG_FILE="/var/log/user_setup.log"
echo "$(date) - User '$USERNAME' created and configured" >> "$LOG_FILE"
if [ $? -ne 0 ]; then
  echo "Error: Failed to write log to $LOG_FILE"
  exit 1
fi

#Step 8: Confirmation Message
echo "User '$USERNAME' created and configured successfully!"

Show more...
1 week ago
12 minutes 26 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 4: Ep 5: Powering Up with PowerShell

Unlock automation on Windows! We'll start with PowerShell basics, showing you how to write, execute, and expand simple scripts to display messages, get dates, list processes, and manage services. Learn to automate tasks efficiently on Windows Server 2022.

Commands:

.\WelcomeScript.ps1

Get-Date

Get-Process

Get-Service | Where-Object { $_.Status -eq 'Running' }

Get-WmiObject -Class Win32_Product | Select-Object Name,Version

Get-NetIPAddress


Show more...
2 weeks ago
10 minutes 27 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 4: Ep 4: Linux Reconnaissance

Explore active information gathering in Linux! This episode teaches you how to enumerate a vulnerable Bee-Box machine using Kali Linux tools. You'll learn Nmap for identifying open ports and services, and Metasploit for deeper SMTP enumeration, strengthening your reconnaissance skills.

Link: Bee-Box official download page

Commands: nmap -Pn -sS –sV <Bee-Box IP Address>

nmap -Pn -sS -sV -p 25 <Bee-Box IP Address>

auxiliary/scanner/smtp/smtp_enum

set RHOSTS <IP of the Bee-Box>

set THREADS <Number of Logical Processors>

Show more...
3 weeks ago
13 minutes 26 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 4: Ep 3: Windows System Deep Dive

Uncover the hidden information on Windows systems! Learn how to use Microsoft's powerful PsTools suite to gather system information, track user sessions, enumerate services, and analyze event logs on a Windows Server 2022. We'll explorecommands like pslist.exe, psloglist.exe, and saving output to files.

PsTools Link: https://learn.microsoft.com/en-us/sysinternals/downloads/pstools.

Commands: .\pslist.exe

.\psloggedon.exe

.\psloglist.exe

.\psservice.exe

Save output by:

.\psloglist.exe >> C:\Logdata.txt




Show more...
1 month ago
9 minutes 58 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 4: Ep 2: Deploying Your Target

Get your target ready! This episodeguides you through downloading and setting up a Windows Server 2022 virtualmachine within VMware. We'll walk through the installation processstep-by-step, preparing a vulnerable environment for your ethical hacking adventures.

Link I used for myself: https://www.microsoft.com/en-us/evalcenter/download-windows-server-2022.

Show more...
1 month ago
9 minutes 55 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 4: Ep 1: Building Your Digital Lab

Episode 1: Building Your Digital Lab – VMware & Kali Linux Setup
Kick off your cybersecurity journey with the essentials! In this episode, we guide you through creating a secure virtualized environment by installing VMware Workstation and setting up your Kali Linux virtual machine for penetration testing. From downloading the ISO to configuring your VM settings, we’ll walk you through every step to build your personal digital lab.

👉 Download VMware Workstation here: https://www.techspot.com/downloads/189-vmware-workstation-for-windows.html


Show more...
1 month ago
9 minutes 49 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 4 - Going a level deeper - Introduction

🎙️ Series 4: Laying the Foundations

Kickstart your cybersecurity journey with hands-on labs and real-world skills! In this series, we’ll set up virtual machines, explore Windows and Linux systems, and dive into scripting, debugging, and securing environments. Perfect for beginners and aspiring ethical hackers.

Episodes:
1️⃣ Building Your Digital Lab – Set up VMware Workstation and Kali Linux for penetration testing.
2️⃣ Deploying Your Target – Install Windows Server 2022 as a vulnerable lab machine.
3️⃣ Windows Deep Dive – Use PsTools to enumerate users, services, and event logs.
4️⃣ Linux Reconnaissance – Master Nmap and Metasploit against a Bee-Box target.
5️⃣ Powering Up with PowerShell – Learn the basics of scripting and automation on Windows.
6️⃣ Bash Scripting Essentials – Automate user management and SSH setup in Kali Linux.
7️⃣ Debugging Your Code – Fix common PowerShell and Bash scripting errors.
8️⃣ Memory Matters – Explore program memory layouts and forensic queries with PowerShell.
9️⃣ Files & Formats – Work with FAT32 and NTFS, file operations, and permissions.
🔟 Locking It Down – Restrict user access and secure folders with NTFS permissions.

Show more...
1 month ago
5 minutes 37 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 3: Ep 10: The Cyber Citadel Blueprint – Building a Scalable Security Program

Bring all concepts together and let's start working on security together

Show more...
4 months ago
7 minutes 49 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 3: Ep 9: The Human Firewall – Building Security Culture & Awareness

People - Both strongest and the weakest links

Show more...
4 months ago
6 minutes 38 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 3: Ep 8: The GRC Framework – Holding the Citadel Together

GRC - Governance, Risk and Compliance -> Team leading security at every organization

Show more...
4 months ago
8 minutes 4 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 3: Ep 7: Breach Ready – Incident Detection & Response

In this episode, we dive into building breach-ready systems with strong incident detection and response strategies. Learn how to identify threats early, contain damage, and recover fast.


Show more...
5 months ago
10 minutes 39 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 3: Ep 6: Infrastructure security

Let's learn about how to secure your infrastructure

Show more...
5 months ago
10 minutes 23 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 3: Ep 5: How to identify and classify assets

Let's start by understanding the first step of building a cyber citadel

Show more...
5 months ago
13 minutes 12 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 3: Ep 4: Building Your Cyber Citadel

Today, we're diving headfirst into the fascinating world of Security and Risk Management.

Show more...
5 months ago
10 minutes 53 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 3: Ep 3: Always remember this for data protection

Get ready to refresh your memory about data protection

Show more...
1 year ago
6 minutes 55 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 3: Ep 2: Threat Modeling

During the initial stages of product design, security architects usually come into the picture and perform threat analysis using threat modeling.

Show more...
1 year ago
6 minutes 25 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 3: Ep 1: Steps in product review

Understand what security architects look for in a product

Show more...
1 year ago
4 minutes 3 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 3 - Introduction

It's time to make it real and start connecting the product worldwith cyber.

Show more...
1 year ago
5 minutes 57 seconds

Learn As I Learn - Technology, Product and Cybersecurity
Series 2: Ep 16: Improper authentication

In Series 2, Episode 16, uncover the perils of improper authentication methods in the digital landscape. Join us as we dissect real-world cases, highlighting the consequences of weak authentication practices and providing essential guidance on fortifying online security protocols.

Show more...
1 year ago
6 minutes 17 seconds

Learn As I Learn - Technology, Product and Cybersecurity
No time to learn? Take out few minutes from your life and learn new things every day! Please subscribe to start learning for FREE now!