We have been learning about reconnaissance, enumeration, privilege escalation, etc, but in a separate way. Let’s put together our hacking knowledge to (pretend we are) hacking a remote system.
Continue ReadingDay 082 #FromZeroToHacker – Cryptography for Dummies
Without encryption, communications would be very insecure and would be easy for a hacker to see your data. Luckily, almost all the data you send and get is encrypted and can’t be seen in plain text.
Continue ReadingDay 081 #FromZeroToHacker – Geolocating images
Geolocating images is the process of finding out the real-world location of an image. Let’s see how it is done.
Continue ReadingDay 080 #FromZeroToHacker – ffuf for beginners
ffuf stands for Fuzz Faster U Fool and it’s a tool written in Golang used for web enumeration, fuzzing, and directory brute forcing.
Continue ReadingDay 079 #FromZeroToHacker – Bash scripting for beginners
Bash is a scripting language that runs within the terminal on most Linux distros. Shell scripts are a series of bash commands, combined to achieve complex tasks that let us automate sysadmin tasks.
Continue ReadingDay 078 #FromZeroToHacker – The hacker methodology
Nessus vulnerability scanner is what it does say on the tin: A vulnerability scanner. Using techniques similar to Nmap, but presenting the information in a beautiful GUI.
Continue ReadingDay 077 #FromZeroToHacker – Nessus for beginners
Nessus vulnerability scanner is what it does say on the tin: A vulnerability scanner. Using techniques similar to Nmap, but presenting the information in a beautiful GUI.
Continue ReadingDay 076 #FromZeroToHacker – Hydra for beginners
Hydra is a brute force online password cracking program and a quick system login password hacking tool. Hydra can run a list and brute-force authentication services, especially if they have weak passwords.
Continue ReadingDay 075 #FromZeroToHacker – Nmap for beginners
Proper enumeration should be done before any exploitation attempts are made, as the more knowledge we have, the more vectors attack we may use.
Continue ReadingDay 072 #FromZeroToHacker – History of Malware
“Malware” consists of two words combined: “Malicious” and “Software”. Malware is designed to damage computers and/or networks.
Continue Reading