Unveiling Hidden Secrets: A Comprehensive Guide to Hash Cracking, Steganography, and Privilege Escalation
In this Capture the Flag (CTF) exercise from TryHackMe, I demonstrate my skills in using various tools to enumerate hidden directories, gain initial access to a vulnerable machine, and exploit privilege escalation vulnerabilities to achieve root access. The exercise involves the following pentesting elements: Initial Enumeration I start by navigating to the target IP address […]
Creating a Keylogger with Python: A Step-by-Step Guide
In the realm of cybersecurity, understanding the tools and techniques used by both security professionals and malicious actors is crucial. One such tool is the keylogger, a program that records keystrokes on a computer. While keyloggers can be used for legitimate purposes such as monitoring network usage and troubleshooting technical problems, they are often associated […]
Cracking the “Admin has the Power” CTF Challenge
The “Admin has the Power” challenge presents a scenario where a seemingly innocuous comment line holds the key to unlocking administrative access. This blog post will take you on a journey through the steps involved in solving this CTF challenge, highlighting the importance of attention to detail and the power of browser developer tools. When […]
Malware Analysis using Wireshark
RedLine Stealer is among the most widespread and prevalent information-stealing malware logs. It is commonly disseminated via phishing emails, malicious websites, or bundled with software. Once it infiltrates a system, RedLine can extract a variety of sensitive data, including passwords, credit card details, cryptocurrency wallet seed phrases, cookies, and application data. Additionally, it can gather […]
Step-by-Step Guide to Building a Random Password Generator
Password security is a crucial aspect of online safety, yet it often represents one of the weakest links in an individual’s or organization’s cybersecurity defenses. A strong password is one that cannot be easily guessed or cracked through brute force or dictionary attacks. Reusing the same password across multiple accounts is highly risky because it […]
Setting Up an SSH Honeypot Using Cowrie
Introduction to Honeypots in Cybersecurity Hey everyone! Today, I want to share an exciting project I recently worked on: setting up a honeypot. If you’re not familiar with the term, a honeypot is a decoy system designed to attract and trap cyber attackers by mimicking a legitimate target. It’s like setting up a fake treasure […]