Cryptography is used to protect confidentiality, ensure integrity and authenticity. Even if we don’t notice, we use encryption daily.
Continue ReadingDay 070 #FromZeroToHacker – John the Ripper
John the ripper is one of the most used hash cracking tools out there. Fast, great range of hash types and loads of tutorials and information.
Continue ReadingDay 069 #FromZeroToHacker – Hashing – Crypto 101
Hashing is the process of transforming a given key or string of characters into another value. This is especially useful when we are dealing with passwords.
Continue ReadingDay 068 #FromZeroToHacker – Common cyber attacks
Using the internet is something common nowadays, so it is imperative that we understand and can protect ourselves against common attacks.
Continue ReadingDay 067 #FromZeroToHacker – Security Awareness
Based on a report from IBM, human errors were the main reason for 95% of successful cyber attacks. That is why security awareness is so important.
Continue ReadingDay 066 #FromZeroToHacker – XML eXternal Entity (XXE) attacks
XXE injection is a web security vulnerability that allows an attacker to interfere with an application’s processing of XML data. Let’s learn the different ways we can do this.
Continue ReadingDay 066 #FromZeroToHacker – Google Dorking
Google Dorking is a hacker technique that uses Google Search to find security holes in the configuration and computer code that websites use.
Continue ReadingDay 065 #FromZeroToHacker – Introductory Researching
Hacking requires a wide knowledge base that is impossible to attain: New things get patched, discovered and modified every day.
Continue ReadingDay 064 #FromZeroToHacker – Python for begginers
Python is an incredible tool for Pentesters. From creating scripts to creating our own security tools, Python is an easy to learn language.
Continue ReadingDay 061 to 063 #FromZeroToHacker – Windows privilege escalation
Often we find Windows hosts with an unprivileged user that we can elevate privileges from,using this to escalate to an administration account.
Continue Reading