Jan 24 · 8 min read · Caesar Cipher The Caesar Cipher in fact belongs to the oldest encrypting methods. The cipher involves the shifting of each letter in the plaintext by a certain number of places down or up within the alphabet. For instance, if the shifting number is 3...
Join discussion
Dec 28, 2025 · 3 min read · The Mission: Breach at the QA Environment The 24-hour speed run intensity is peaking as I hit Day 7: "Network Discovery — Scan-ta Clause." The rogue group HopSec has breached the TBFC QA environment (tbfc-devqa01) and locked the staff out. Without th...
Join discussionJun 4, 2025 · 3 min read · Analogy Imagine two spies trying to communicate. One spy (attacker) waits at a safe house (port). The other spy (target) reaches out to initiate a secret chat - that’s a reverse shell. But if the safe house is locked and inaccessible, the first spy m...
Join discussion
Jun 3, 2025 · 4 min read · Analogy: Imagine you're locked outside your house (the attacker's machine), and the only way in is by having someone inside (the target machine) call you and leave the door open and that’s a reverse shell. But what if you could just tell the house to...
Join discussion
Oct 24, 2024 · 6 min read · Problem Statement To be a good cybersecurity engineer you have to learn writing script in python. Prerequisites Python (basic) socket module (i/o ops enough) Solution After connecting to the netcat instance, we will be given a list of coordinat...
Join discussionOct 24, 2024 · 8 min read · In this hands-on tutorial, you'll learn how to harness the power of Netcat to build practical networking tools. We’ll start with basic message transmission. Then you'll progress to creating a file transfer system, and you’ll ultimately develop a secu...
Join discussion
Aug 3, 2024 · 3 min read · Imagine you are enjoying your regular cup of coffee. Sip... ahhh! It’s a nice morning, and you are ready for work, you open your laptop, and BAM!! have a Docker task assigned to you i.e. you are supposed to transfer a file from a folder “Source” to ...
Join discussion
May 28, 2023 · 3 min read · In the vast world of Linux, there are numerous powerful command-line tools at your disposal. One such tool that deserves your attention is Netcat, often referred to as the "Swiss Army Knife of Networking." Don't let its name deceive you; Netcat is no...
Join discussion
Apr 16, 2023 · 3 min read · Netcat, also known as "nc", is a versatile networking utility tool that is used to perform a variety of tasks related to network communication. Netcat is a command-line tool that is available on most Unix-based systems, including Linux and macOS, as ...
Join discussion