Posts

A New Chapter: From Curiosity to Action

Image
"Completion of the 4th Cohort of 'Early-Stage Investment Analyst Training' VC Sprint" In my mid-40s, I believed there was nothing left I hadn't experienced, having lived a busy life. However, curiosity sparked when an MZ-generation colleague introduced me to the world of startups and investment markets . Seeking answers, I applied for an early-stage investment analyst course , which became an opportunity to finally confront a long-held dream— entrepreneurship. It also became the push I needed to break free from the "addictive salary" cycle. I am deeply grateful to the instructors who guided us and to my fellow cohort members who shared this journey. Let's keep in touch and meet often in the future! #KoreaEarlyStageInvestmentAssociation #EOSStudio #StartupEntrepreneurship http://www.hitnews.co.kr/news/articleView.html?idxno=53059&fbclid=IwY2xjawIpQGtleHRuA2FlbQIxMQABHZr2lKcG5IkNKa9WIWiuhdUMfxcBurm65tCP_VMsWsPGYlknTzZakFkuXw_aem_iYj-y2yd9C4lg9xIw...

🛠️ Advanced Hacking Practice: Step-by-Step Guide

Image
Now that you've completed the basic hacking exercises, let's move on to real-world attack techniques and security countermeasures . This guide covers web hacking, system hacking, network hacking, wireless hacking, and digital forensics in a detailed, step-by-step format. 🚀 1️⃣ Advanced Web Hacking: OWASP Top 10 Learn how to exploit and secure common web vulnerabilities. ✅ Requirements Kali Linux (Attacker) DVWA (Damn Vulnerable Web App) or bWAPP (Vulnerable Web Application) Burp Suite (Web request interception tool) 📌 Exercise 1: Cross-Site Scripting (XSS) Attack XSS allows attackers to inject malicious scripts into web pages. 1️⃣ Install and Run DVWA Open DVWA on the target machine ( http://[Target IP]/dvwa/ ). Login Credentials: Username: admin Password: password Set Security Level to "Low" in the settings. 2️⃣ Perform an XSS Attack Navigate to "Vulnerabilities" → "XSS Stored" . In the input field, enter the follo...

🛠️ Hacking Practice Guide: A Step-by-Step Tutorial for Beginners

Image
Hello! 😃 This guide is designed to help you practice hacking in a structured and easy-to-follow way. Even if you are new to hacking, you can follow this step-by-step guide and complete the exercises successfully. 🚀 1️⃣ Setting Up the Practice Environment 🏗️ ✅ 1. Installing a Virtual Machine Hacking practice should be done in a safe, isolated environment , not on a real system. We will use VirtualBox or VMware to set up virtual machines. 📌 Required Software Downloads: VirtualBox: 🔗 Download Kali Linux (OS with built-in hacking tools): 🔗 Download Metasploitable (Vulnerable practice server): 🔗 Download Installation Steps: Install VirtualBox . Add Kali Linux and Metasploitable as separate virtual machines. Set Kali Linux as the attacker machine and Metasploitable as the target server . Connect both virtual machines to the same network (Host-Only Adapter) . Now, you're all set! 🎉 2️⃣ Information Gathering (Reconnaissance) 🕵️‍♂️ Before attacking a ...

SORA: AI-Generated Videos and Cybersecurity Risks

Image
In February 2024, OpenAI introduced Sora , an advanced text-to-video AI capable of generating highly realistic videos up to one minute long based on textual descriptions. This revolutionary model has raised cybersecurity concerns , particularly in the realm of deepfake attacks, misinformation, and AI-driven cyber threats . ( dbr.donga.com ) 1. Deepfake Cyber Threats & Social Engineering Risks Sora’s ability to create hyper-realistic videos has significantly lowered the barrier for cybercriminals to craft deceptive content . This includes: Impersonation Attacks: Hackers could generate deepfake videos of executives, politicians, or security personnel to manipulate decision-making processes. Spear Phishing & Business Email Compromise (BEC): Attackers could integrate AI-generated videos into phishing campaigns, making social engineering tactics more convincing . Disinformation & Psychological Warfare: Nation-state actors may use Sora to create manipulated news reports or...

NL2SQL: A Revolutionary Technology for Cybersecurity and Maritime Hacking Defense

Image
In recent years,  "NL2SQL"  has gained attention as a groundbreaking technology that enhances interaction with databases. NL2SQL stands for  Natural Language to SQL , a  natural language processing (NLP) technique that converts human language into SQL queries . This technology is emerging as a  powerful cybersecurity tool , particularly in  cyber threat detection and maritime hacking defense .   1. Enhancing Cybersecurity Monitoring with NL2SQL NL2SQL streamlines security monitoring and threat detection by enabling intuitive queries in natural language. 🔹 Security Operation Centers (SOC) can instantly identify threats with queries like: "Show me all abnormal login attempts in the last 24 hours." 🔹 SQL Conversion Example: 복사 편집 SELECT * FROM login_attempts WHERE timestamp >= NOW() - INTERVAL 24 HOUR AND failed_attempts > 5 ORDER BY timestamp DESC ; This allows security teams to detect potential hacking attempts quickly wi...

(Environment) (AWS, Mac) Project Execution and Modeling in an Enterprise Setting

Image
I have resumed engineering and modeling tasks , which I had temporarily set aside to focus on project management and new business planning . For a project that involves optimizing (tuning) individual models for image and text processing , as well as integrating multiple models —a skill I honed during my Ph.D. program—I now require a complex and well-structured work environment . To ensure optimal efficiency under the given constraints , I plan to set up, refine, and document the work environment for future reference. "If I had eight hours to chop down a tree, I would spend six hours sharpening the axe." – Abraham Lincoln (1861–1865), the 16th President of the United States Review of Work Environment 1. Managing Work on an Unstable Server & Data Backup ✅ Backup & Record Management: Using SFTP to store and synchronize data in a structured manner. ✅ GitHub Usage: Limited to baseline model development and version control for key components. ✅ Code & Data Managem...

🚢 The Impact of Starlink on Maritime Cybersecurity: A Necessary Investment for the Future

Image
For decades, maritime vessels operated with limited and slow satellite communications , making them less attractive targets for cyberattacks . However, with the introduction of Starlink , ships now have access to high-speed, low-latency internet , transforming them into fully connected digital platforms . While this advancement brings enormous benefits in operational efficiency, it also exposes vessels to unprecedented cybersecurity risks .  SpaceX Debuts Maritime Offering for Starlink As the shipping industry embraces Starlink-powered connectivity , investing in cybersecurity has become a necessity, not an option . This article explores the growing cyber threats faced by ships due to Starlink and how businesses should strategically invest in security measures to mitigate these risks. 🌊 1. How Starlink is Changing the Cybersecurity Landscape for Ships Traditionally, ships relied on expensive and slow VSAT (Very Small Aperture Terminal) or Inmarsat satellite connections , which...