Let's learn about

Tutorials and learning resources for programmers

  • Home
  • #FromZeroToHacker
  • Tutorials.py
  • Utils.py
  • About…
  • Home
  • DavidMM
  • Page 3

Day 071 #FromZeroToHacker – Encryption – Crypto 101

Cryptography is used to protect confidentiality, ensure integrity and authenticity. Even if we don’t notice, we use encryption daily.

11 August, 202311 August, 2023#FromZeroToHacker, cryptography, Ethical hacker, Hacking, TryHackMe
Continue Reading
John the ripper

Day 070 #FromZeroToHacker – John the Ripper

John the ripper is one of the most used hash cracking tools out there. Fast, great range of hash types and loads of tutorials and information.

10 August, 202316 August, 2023#FromZeroToHacker, cryptography, Ethical hacker, Hacking, TryHackMe
Continue Reading
Cryptography

Day 069 #FromZeroToHacker – Hashing – Crypto 101

Hashing is the process of transforming a given key or string of characters into another value. This is especially useful when we are dealing with passwords.

9 August, 202311 August, 2023#FromZeroToHacker, cryptography, Ethical hacker, Hacking, TryHackMe
Continue Reading

Day 068 #FromZeroToHacker – Common cyber attacks

Using the internet is something common nowadays, so it is imperative that we understand and can protect ourselves against common attacks.

8 August, 202311 August, 2023#FromZeroToHacker, Ethical hacker, Hacking, TryHackMe
Continue Reading
Security Awareness

Day 067 #FromZeroToHacker – Security Awareness

Based on a report from IBM, human errors were the main reason for 95% of successful cyber attacks. That is why security awareness is so important.

7 August, 20237 August, 2023#FromZeroToHacker, Ethical hacker, Hacking, TryHackMe
Continue Reading
XXE attack

Day 066 #FromZeroToHacker – XML eXternal Entity (XXE) attacks

XXE injection is a web security vulnerability that allows an attacker to interfere with an application’s processing of XML data. Let’s learn the different ways we can do this.

6 August, 20236 August, 2023#FromZeroToHacker, Ethical hacker, Hacking, TryHackMe
Continue Reading
Google Droks

Day 066 #FromZeroToHacker – Google Dorking

Google Dorking is a hacker technique that uses Google Search to find security holes in the configuration and computer code that websites use.

6 August, 20236 August, 2023#FromZeroToHacker, Ethical hacker, Hacking, TryHackMe
Continue Reading

Day 065 #FromZeroToHacker – Introductory Researching

Hacking requires a wide knowledge base that is impossible to attain: New things get patched, discovered and modified every day.

5 August, 20235 August, 2023#FromZeroToHacker, Ethical hacker, Hacking, TryHackMe
Continue Reading
Python logo

Day 064 #FromZeroToHacker – Python for begginers

Python is an incredible tool for Pentesters. From creating scripts to creating our own security tools, Python is an easy to learn language.

4 August, 20234 August, 2023#FromZeroToHacker, Ethical hacker, Hacking, Python, TryHackMe
Continue Reading
Windows Privilege Escalation logo

Day 061 to 063 #FromZeroToHacker – Windows privilege escalation

Often we find Windows hosts with an unprivileged user that we can elevate privileges from,using this to escalate to an administration account.

3 August, 20238 August, 2023#FromZeroToHacker, Ethical hacker, Hacking, Privilege escalation, TryHackMe
Continue Reading

Posts pagination

Previous 1 2 3 4 … 17 Next
Lynis logo

Security auditing your Linux OS with Lynis

25 January, 2024
Docker

Creating our own Docker images

12 January, 2024
Docker

Docker basics for beginners

7 January, 2024

Vagrant tutorial for beginners

7 January, 2024

The Linux File System: A simple guide for beginners

1 November, 2023

Follow me on Twitter

My Tweets