In this Capture the Flag (CTF) exercise from TryHackMe, I demonstrate my skills in using various tools to enumerate hidden directories, gain initial access to a vulnerable machine, and exploit…
In the realm of cybersecurity, understanding the tools and techniques used by both security professionals and malicious actors is crucial. One such tool is the keylogger, a program that records…
The “Admin has the Power” challenge presents a scenario where a seemingly innocuous comment line holds the key to unlocking administrative access. This blog post will take you on a…
RedLine Stealer is among the most widespread and prevalent information-stealing malware logs. It is commonly disseminated via phishing emails, malicious websites, or bundled with software. Once it infiltrates a system,…
Password security is a crucial aspect of online safety, yet it often represents one of the weakest links in an individual’s or organization’s cybersecurity defenses. A strong password is one…

Unveiling Hidden Secrets: A Comprehensive Guide to Hash Cracking, Steganography, and Privilege Escalation

In this Capture the Flag (CTF) exercise from TryHackMe, I demonstrate my skills in using various tools to enumerate hidden directories, gain initial access to a vulnerable machine, and exploit privilege escalation vulnerabilities to achieve root access. The exercise involves the following pentesting elements: Initial Enumeration I start by navigating to the target IP address […]

9 mins read

Creating a Keylogger with Python: A Step-by-Step Guide

In the realm of cybersecurity, understanding the tools and techniques used by both security professionals and malicious actors is crucial. One such tool is the keylogger, a program that records keystrokes on a computer. While keyloggers can be used for legitimate purposes such as monitoring network usage and troubleshooting technical problems, they are often associated […]

6 mins read

Malware Analysis using Wireshark

RedLine Stealer is among the most widespread and prevalent information-stealing malware logs. It is commonly disseminated via phishing emails, malicious websites, or bundled with software. Once it infiltrates a system, RedLine can extract a variety of sensitive data, including passwords, credit card details, cryptocurrency wallet seed phrases, cookies, and application data. Additionally, it can gather […]

8 mins read

Step-by-Step Guide to Building a Random Password Generator

Password security is a crucial aspect of online safety, yet it often represents one of the weakest links in an individual’s or organization’s cybersecurity defenses. A strong password is one that cannot be easily guessed or cracked through brute force or dictionary attacks. Reusing the same password across multiple accounts is highly risky because it […]

5 mins read