Jan 1 · 3 min read · For Day 17 of my Advent of Cyber 2025 marathon, the mission intensified with "CyberChef — Hoperation Save McSkidy," where I launched a rescue attempt to breach the Quantum Fortress,. McSkidy was imprisoned by Sir Breacher Block III, and the only way ...
Join discussion
Jul 28, 2025 · 3 min read · This challenge presented a web application that at first glance appeared to be static, with a single background image and minimal interactive content. Enumeration using tools like Gobuster didn’t reveal much, but manually inspecting the page source u...
Join discussion
Jan 10, 2025 · 4 min read · Introduction Cryptographic hash functions are essential tools in cybersecurity, providing data integrity, authentication, and more. Among the myriad of hashing algorithms, MD5 and SHA-256 are two widely recognized names. While MD5 has historically be...
Join discussion
Aug 3, 2023 · 5 min read · I cannot count the number of times that I had to work with engineers that held fancy titles but simply didn't know how to do a basic checksum verification. MD5 stands for "Message Digest Algorithm 5." It is a widely used cryptographic hash function t...
Join discussion
Jul 18, 2023 · 3 min read · Hash functions like SHA-256 and MD5 are extensively used in real-world applications. In this article, we will showcase the hashing process through hands-on examples. Read on to gain a practical understanding of cryptographic hash functions. Introduct...
Join discussion
Jun 4, 2023 · 3 min read · Welcome to our interactive blog post on benchmarking hashing algorithms! In this post, we will explore various hashing algorithms and compare their performance using real-world scenarios. So let's dive in and see how different algorithms fare in term...
Join discussion