diff --git a/Skills/Code_Breaking/README.md b/Skills/Code_Breaking/README.md index dd391ae..0895245 100644 --- a/Skills/Code_Breaking/README.md +++ b/Skills/Code_Breaking/README.md @@ -1,4 +1,5 @@ # Code-Breaking and Decoding +[BACK TO UACTF](/UACTF)
Having the ability to interpret and understand data even if it is presented in a different or unknown format is extremely important to conducting cyber security examinations and to the general understanding of cyber security. A coded message is simply a message that has been changed in some way so as to hide its meaning from prying eyes.
@@ -20,3 +21,5 @@ Encryption is different from encoding as encoded messages do not require secret [How to Make Your Data Safe Using Cryptography](https://www.guru99.com/how-to-make-your-data-safe-using-cryptography.html)
[Cryptography - KhanAcademy](https://www.khanacademy.org/computing/computer-science/cryptography)
+ +[BACK TO UACTF](/UACTF)
\ No newline at end of file diff --git a/Skills/File_Analysis/README.md b/Skills/File_Analysis/README.md index f8410eb..be548d0 100644 --- a/Skills/File_Analysis/README.md +++ b/Skills/File_Analysis/README.md @@ -1,4 +1,5 @@ # File Analysis +[BACK TO UACTF](/UACTF)
File analysis and understanding is one aspect of the larger field of Digital Forensics. Digital Forensics encompasses the investigation of data found on digital devices and involves preserving, identifying, extracting, documenting and interpreting this data.
@@ -16,4 +17,6 @@ One of the more interesting items that occur during an investigation is when a s

FileSignatures -

\ No newline at end of file +

+ +[BACK TO UACTF](/UACTF)
\ No newline at end of file diff --git a/Skills/Network_Traffic_Analysis/README.md b/Skills/Network_Traffic_Analysis/README.md index e9de6e0..4dc709d 100644 --- a/Skills/Network_Traffic_Analysis/README.md +++ b/Skills/Network_Traffic_Analysis/README.md @@ -1,4 +1,5 @@ # Network Traffic Analysis +[BACK TO UACTF](/UACTF)
Network traffic analysis begins by understanding the components of network communication. In this context, it will be key to understand the components of network packets in addition to having the ability to capture, filter, and interpret traffic. Wireshark is very good at packet capture and protocol analysis and is one of the better tools for helping with understanding of network traffic.
@@ -32,4 +33,6 @@ information.

hf1 hf2 -

\ No newline at end of file +

+ +[BACK TO UACTF](/UACTF)
\ No newline at end of file diff --git a/Skills/Website_Security/README.md b/Skills/Website_Security/README.md index d40cdf9..240624e 100644 --- a/Skills/Website_Security/README.md +++ b/Skills/Website_Security/README.md @@ -1,4 +1,5 @@ # Website Security +[BACK TO UACTF](/UACTF)
One of the most overlooked aspects of the corporate environment is the health and security of the company website. Far too often it is not until after a security breach has occurred that investments in website security practices are made. To protect the security of the website, one needs to be proactive with a defensive mindset.
@@ -21,4 +22,6 @@ Number seven on the list is another very common vulnerability, Cross-Site Script Below is a tutorial on Cross-Site Scripting.
-https://excess-xss.com/ \ No newline at end of file +https://excess-xss.com/ + +[BACK TO UACTF](/UACTF)
\ No newline at end of file