Published inInfoSec Write-upsTryHackMe - BenignChallenge Link : https://tryhackme.com/room/benign Difficulty : MediumJan 12, 2024Jan 12, 2024
Published inSystem Weakness3 PowerShell commands to use in hackingSometimes, when you get access to a vulnerable machine, you might want to immediately run some predefined popular scripts, written in…Jan 9, 2024Jan 9, 2024
Published inSystem WeaknessAlternate Data Streams - Good or Bad?Some people might say it’s good, others would consider it a bad thing. Well, as many elements in this world, it depends on its usage.Dec 2, 2023Dec 2, 2023
Published inSystem WeaknessUnderstanding DLL hijacking - What it is and how it’s used in hackingNo, this is not about how to rob a van of a delivery company 😅. DLL hijacking is a technique used in cybersecurity. Maybe you might have…Nov 5, 2023Nov 5, 2023
Published inSystem WeaknessExplaining IP SpoofingHave you ever seen a magician performing a trick? Even though you saw something, you knew it wasn’t real, right? Well, the same thing is…Oct 3, 2023Oct 3, 2023
Published inSystem WeaknessSQL injectionTesla 2014, Cisco 2018, Fortnite 2019. They have one thing in common. All of them recorded vulnerabilities related to SQL injection. Such…Sep 8, 2023Sep 8, 2023
Published inSystem WeaknessDeveloper Tools - How to use them in hackingIf you worked in web development, most probably you already know what these are. However, for some of us, this term might be a new one, so…Aug 14, 2023Aug 14, 2023
Published inInfoSec Write-upsTryHackMe - CaptureChallenge Link : https://tryhackme.com/room/capture Difficulty : EasyJul 24, 2023Jul 24, 2023
Published inSystem WeaknessPhoto Cleaner - How to delete metadata from photosDid you know some of your photos contain more information than you think? Yes, this is metadata, a bunch of data which provides various…Jul 11, 20231Jul 11, 20231
Published inInfoSec Write-upsTryHackMe - SmagGrottoChallenge Link : https://tryhackme.com/room/smaggrotto Difficulty : EasyJun 13, 2023Jun 13, 2023