PickleRick Writeup – TryHackMe
This post is a walkthrough of the PickleRick which is a Rick and Morty themed Tryhackme room. The goal is to find three hidden flags.
This post is a walkthrough of the PickleRick which is a Rick and Morty themed Tryhackme room. The goal is to find three hidden flags.
The first major step in the software development field is having proper knowledge and understanding of the object-oriented programming concept and its implementation.
These are the most important libraries for anyone who uses python programming languages. Top 6 libraries which are also in daily use of all the top-notch companies.
The most basic steps and explanation to crack any WPA, WPA2-PSK networks using Airmon-Ng.
This post is a walkthrough of the PickleRick which is a Rick and Morty themed Tryhackme room. The goal is to find three hidden flags.
This post is a walkthrough of the famous Mr.Robot CTF virtual machine. I used the platform TryHackMe though you can also find this VM on Vulnhub. The goal is to find three hidden flags.
So this weekend, I participated in a CTF challenge that was organized by GirlScript Goa. It was among the beginner level CTFs, so I was able to solve all but one problem. Nonetheless, I came in 3rd in this and here is my writeup for the solutions of the challenges that I solved. Miscellaneous Challenges […]
Capture The Flag, which is a type of challenge given to cybersecurity professionals and students within a time period in which they have to apply their skills, knowledge over technologies to hack the victim machine.
This post is a walkthrough of the PickleRick which is a Rick and Morty themed Tryhackme room. The goal is to find three hidden flags.
The most basic steps and explanation to crack any WPA, WPA2-PSK networks using Airmon-Ng.
The second phase of ethical hacking and penetration testing involves two terms that are Vulnerability Scanning and Enumeration. Scanning involves taking the knowledge discovered during reconnaissance and using it to look at the network
Information gathering isn’t just a phase of security testing; it’s an art that each penetration tester and hacker should master. Let’s dive deeper into it.
To even join Hack The Box, you have to hack your way in or treat it like a CTF challenge by finding the invite code. This article will take you through how to achieve the challenge mentioned. However, I highly recommend that you first try to hack yourself in(on your own) and only use this article as a guide in case you need help.
The best solution for overheating and thermal throttling for heavy machine and gaming laptops.
Ever thought of how hackers steal your critical data or credentials via social engineering or phishing scam? Let’s see in this tutorial how hackers can steal your valuable data via a phishing scam. The first question that pops in mind is, what is phishing?
There’s no fixed way to start hacking, and you need not be of a computer science background to learn this. But there are some basic knowledge and things you need to know in order to become one.
Here are 3 main things every Beginner Hacker should know about. These tips will get you started and are very important.
VPN Vs Proxy: Which one is better for you? A VPN and a proxy both will connect you to a remote computer, but that’s where similarities end.
Every time you see some network settings, there is IPv4 or IPv6. As you can guess, the previous versions are long in the past (TCP/IP v1,v2, and v3). But why is it IPv4 vs IPv6 instead of the 5th version vs the 6th? How is that the IPv4 from the 80s is still around? Let’s find out!
Before jumping to TCP vs UDP we must understand what TCP and UDP are. TCP and UDP are protocols that are a part of the transport layer in the OSI model. Both of these protocols are used for sending packets over the internet. They are built over the Internet Protocol(IP).
OSI Model is used to understand how data is transferred from one computer to another in a computer network. To accomplish successful communication between computers or networks of different architecture 7 Layer of OSI Model was defined consisting of Application, Presentation, Session, Transport, Datalink, and Physical layer.
Don’t let ANYONE else use your charger. Researchers at Tencent lab has found malware and named it BadPower than can potentially melt or blast your phone by just charging.
Twitter accounts of top profiles like Bill Gates, Jeff Bezos, Elon Musk and many others got compromised due to a massive security breach and made people to lose over couple of thousand dollars in the form of bitcoin
An undetectable malware with capability to steal SMS to bypass OTP and buy premium service subscription and drain the victim’s wallet. 17k such apps removed so far.
Google has released an Open Source Web Vulnerability Scanner “Tsunami” which automates a lot of tasks for networks with thousands of devices.
The first major step in the software development field is having proper knowledge and understanding of the object-oriented programming concept and its implementation.
These are the most important libraries for anyone who uses python programming languages. Top 6 libraries which are also in daily use of all the top-notch companies.
FANG’s obsessive topics or topics from the competitive programming which FANG is so obsessed with! these days. Google, Facebook, Microsoft, Netflix, and Amazon have kept on asking questions over these three topics from the past couple of months in their coding rounds
Java is the most commonly used programming language with most of the devices using it. These are the most commonly asked interview questions on java you should know.
How Nvidia GPUs are purchased using bots to bulk-buy a product, and then put them up for sale on eBay or Amazon for an inflated price which rips off buyer’s eyes out!
The best budget monitors especially for hackers and programmers with a detailed information for why they are required so much and what to know before buying them!
A brief information from the last AMD event about the launch of the new AMD Radeon RX 6800, RX 6800XT and RX 6900XT and their performance comparison with respect to Nvidia’s new Ampere tech 3000 series RTX cards
An amazing security and surveillance solution for your home by amazon!