This blog is related to Computer Security and Ethical hacking and does not promote hacking, cracking, software piracy or any kind of illeg…
Remember In-Person Meetups?!
Earlier this year, before the advent of COVID-19, I attended my first in-person coding meetup in Pittsburgh, PA. I rememb…
Who is a hacker?
A hacker is often considered as that bad guy that breaks into computers and steal people's private stuff, that isn't totally true. Th…
Everyday, we hear a news that the server of X company was hacked. Some rich peoples' social accounts where hacked.
Have you ever wondered, why such …
Contributions from the community are the lifeblood of an open-source project. Attracting new contributors, therefore, is one of the most important par…
This is a fictional account of cyber-crime. The exploits detailed in this narrative are illegal. For example, driving your vehicle well bey…
A penetration test is a subclass of ethical hacking; it comprises a set of methods and procedures that aim at testing/protecting an organization’s sec…
Hello readers! Here is my writeup for this box:
root@kali:~/htb/remote# nmap -T4 -sV -p- -O 10.10.10.180
Starting Nmap 7.80SVN ( https://nma…
Call me lazy, but I just love automating things.
Today we are automating my morning routine.
You may be wondering what that routine is.
Make coffee (…
This will be my first writeup of THM machine and I hope that this will be helpful for all people seeking.
So, As the name suggests the Room is 'Git H…
Your Upcoming Challenges
Nothing to show here
Accept challenges on Hashnode to become better at dev blogging and win cool badges from Hashnode to showcase.