REHAN SAYYEDdignitas.hashnode.dev·Dec 12, 2024Understanding CAN Bus and performing Replay AttackGetting started with Car Hacking, with an introduction to CAN Bus and hands-on with a basic replay attack. Objective Understanding CAN Bus vehicle communication network and getting hands-on with a basic replay attack in the network. Theory Introducti...1 like·41 readsCar Hackingcar hacking
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024Burpsuite The BasicsTASK 1 - Introduction Welcome to Burp Suite Basics! This particular room aims to understand the basics of the Burp Suite web application security testing framework. Our focus will revolve around the following key aspects: A thorough introduction to ...Burpsuite
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024Authentication BypassTASK 1 - Brief In this room, we will learn about different ways website authentication methods can be bypassed, defeated or broken. These vulnerabilities can be some of the most critical as it often ends in leaks of customers personal data. Start the...satvik
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024Linux 101Linux Structure History Many events led up to creating the first Linux kernel and, ultimately, the Linux operating system (OS), starting with the Unix operating system's release by Ken Thompson and Dennis Ritchie (whom both worked for AT&T at the tim...Linux
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024John The RipperHello Hackers 🚀 Today we will be solving the challenges in John The Ripper room on TryHacKMe TASK 1 - John Who Welcome John the Ripper is one of the most well known, well-loved and versatile hash cracking tools out there. It combines a fast cracking...ethicalhacking
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024Encryption 101TASK 1 - What will this room cover? This room will cover: Why cryptography matters for security and CTFs The two main classes of cryptography and their uses RSA, and some of the uses of RSA 2 methods of Key Exchange Notes about the future of enc...Entrepreneurship
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024Nmap Post Port Scan TechniquesTASK 1 - Introduction: This room is the last in the Nmap series (part of the Introduction to Network Security module). In this room, we focus on the steps that follow port-scanning: in particular, service detection, OS detection, Nmap scripting engin...1 likeNetwork Mapper - NMAPnmap
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024Live Host DiscoveryIntroduction We can find live hosts on a network by using any of the 3 scans that are named below: ARP scan: This scan uses ARP requests to discover live hosts ICMP scan: This scan uses ICMP requests to identify live hosts TCP/UDP ping scan: This ...Network Mapper - NMAPnmap
Satvik Vemulapallianonbash.hashnode.dev·Dec 12, 2024Basic Port Scans - NMAPNmap Basic Port Scans INTRODUCTION The next step would be checking which ports are open and listening and which ports are closed. Therefore, in this room and the next one, we focus on port scanning and the different types of port scans used by nmap. ...Network Mapper - NMAPnmap
Chris Holcombenullvoid.hashnode.dev·Dec 11, 2024Python in the Void: Build Your Own Honeypot "PoohBear"Creating a honeypot is a fascinating way to explore cybersecurity concepts and analyze malicious activity. Honeypots serve as decoys, luring attackers into a controlled environment to observe their tactics and techniques. In this tutorial, we’ll walk...Python in the VoidPython