Jul 30, 2025 · 2 min read · Welcome to another breakdown in the R.A.V.E.N. series — a branded, modular approach to privilege escalation. Today, we're dissecting a black box engagement on HTB’s “GetSimple” machine, where remote exploitation leads to root access through theme tem...
Join discussion
Jul 25, 2025 · 17 min read · Introduction Consider the scenario where you just downloaded a 6 GB file and want to know whether the copy you downloaded is identical to the original file, bit for bit. How would you do that? Or if a good Samaritan handed you this 6 GB file on a USB...
Join discussionJul 12, 2025 · 4 min read · In this box, we walk through a hands-on experience of a basic CTF-style Linux machine, where we explore critical concepts useful for real-world penetration testing and OSCP prep. The focus is on: 🔍 Reconnaissance using tools like nmap and gobuster ...
Join discussion
Jun 18, 2025 · 3 min read · Hey again, fellow wanderers of the wire. This chapter took its time. I’ll be honest — getting through cryptography basics was way harder than I expected, and not because the content was overwhelming. It was me. The procrastination, the distractions, ...
Join discussion
Apr 25, 2025 · 3 min read · I’ve been dabbling with password cracking using Hashcat. Previously I wrote a beginners guide called Getting Started with Hashcat that outlined basic usage. After going through the steps I mentioned in that article several times, I realized I could s...
Join discussion
Feb 6, 2025 · 3 min read · In the world of cybersecurity, tools like cap2hashcat play a crucial role in helping security professionals analyze and crack wireless network passwords. This article will provide an in-depth look at what cap2hashcat is, how it works, its importance ...
Join discussion
Jan 22, 2025 · 3 min read · As I delve deeper into my cyber security learning adventure, I’m beginning to pick up and learn new tools. One of the tools I’ve recently started using is Hashcat. Hashcat is a powerful password recovery tool with abilities that extend beyond the sco...
Join discussion
Nov 21, 2024 · 4 min read · I’m in the final year of my electronic and computer engineering course, and one of my favorite topics this semester has been Cryptography and Network Security. Recently, we explored password cracking and brute force attacks, including a class assignm...
Join discussionMar 12, 2024 · 2 min read · I tried cracking the password, but it was too salty 🙂 There are two methods of Hash Cracking Method 1: Online hash cracker You can visit any hash cracker site to crack the hash instantly. For example, the crack station. Just paste the hash and crack...
Join discussion