Pratik MaliforThe Tech Deckthetechdeck.hashnode.dev·Nov 29, 2023Finding a Suitable Metasploit Alternative for Penetration TestingPenetration testing is an important process for evaluating the security of a network or application. Metasploit is a popular penetration testing framework used by cybersecurity professionals. However, there may be situations where an alternative to M...DiscussCyber Securitymetasploit
Pratik MaliforThe Tech Deckthetechdeck.hashnode.dev·Nov 27, 2023How to Install Tor in Kali LinuxTor, short for The Onion Router, is open-source software that enables anonymous communication by directing Internet traffic through a worldwide volunteer network consisting of thousands of relays to conceal a user's location and usage from surveillan...Discuss·59 readsLinuxtor
Pratik MaliforThe Tech Deckthetechdeck.hashnode.dev·Nov 27, 2023How to Use Metasploit in Kali LinuxMetasploit is one of the most popular penetration testing tools used by ethical hackers and security professionals to test the security of computer systems. Kali Linux is a Debian-based Linux distribution specifically designed for digital forensics a...DiscussLinuxKali Linux
Retr0forR3tr0's Team blogretr0x.hashnode.dev·Nov 13, 2023Eclipsing Shadows: An Odyssey into the Enigmatic Realm of CybersecurityEclipsing Shadows: An Odyssey into the Enigmatic Realm of Cybersecurity In the pulsating heart of the digital era, where shadows linger and neon glows define our interconnected existence, the imperative of safeguarding our virtual sanctuaries has tra...Discuss·7 likes·33 readsethicalhacking
ShaaNmirageazlit.hashnode.dev·Nov 11, 2023Navigating the Cyber FrontierIn a digital age fraught with cyber threats, ethical hackers are the frontline defenders. If you've ever wondered how to kickstart a career in hacking, you're in the right place. This guide breaks down the essential steps for aspiring ethical hackers...Discusshacking
Anuj Singh Chauhananujcybersec.hashnode.dev·Nov 6, 2023TryHackMe : BoltToday I am going to solve the Bolt Ctf which is an Easy category CTF of Tryhackme. So like always start with enumeration using Nmap and here is the result of Nmap scan As port 22 is open I started brute force for access using Hydra (though that did...Discuss·35 readspentesting
Veronica Josephcareerusa.hashnode.dev·Nov 6, 2023Mastering in Ethical HackingIn the ever-evolving landscape of cybersecurity, ethical hacking has emerged as a critical practice to safeguard digital assets and information. Ethical hackers, also known as white-hat hackers, play a pivotal role in identifying vulnerabilities with...Discuss#cybersecurity
Anuj Singh Chauhananujcybersec.hashnode.dev·Oct 29, 2023TryHackMe CTF : IgniteIn the series of solving CTF, today I am going to play a CTF named "Ignite" As usual, Start with Nmap scan: Along side I started a gobuster scan on this machine, I was not able to find something very significant and this is the result of that scan: ...Discusspenetration testing
Anuj Singh Chauhananujcybersec.hashnode.dev·Oct 28, 2023TryHackme CTF: StartupThis is the walkthrough of "Startup" CTF of TryHackme. The IP of this machine is 10.10.20.106, so first I am going to perform an Nmap scan. The result of the Nmap scan is: As we can see Anonymous login is allowed, so we will look into it before doin...DiscussCTF Writeup
Anuj Singh Chauhananujcybersec.hashnode.dev·Oct 22, 2023Agent sudo Walkthrough : TryhackmeI started doing CTF for my EJPT exam. Today we are going to do Agent sudo CTF of Tryhackme. First I did a ping to the IP of the machine to check if it was online or not. Task 1(Author Note) : NO answer needed Task 2 : How many open ports? Started Nm...DiscussCTF