In the Protocols and Servers lesson, we covered Telnet, HTTP, POP3, and more. Let’s see how they can be attacked and defended.
Continue ReadingDay 047 #FromZeroToHacker – Protocols and Servers
HTTP, FTP, POP3… How does each one work? What do they do? How they can talk to us? Let’s have a close look at protocols.
Continue ReadingDay 046 #FromZeroToHacker – Active Reconnaissance
In the first lesson of the Network Security Module, we focused on passive reconnaissance. In this one, we will focus on active reconnaissance.
Continue ReadingDay 046 #FromZeroToHacker – Passive Reconnaissance
In passive reconnaissance, we rely on public knowledge we can access without engaging the target to gather information about it.
Continue ReadingDay 045 #FromZeroToHacker – Nmap Post Port Scans
We have found targets and scanned them and their ports. Now it is time for Service and OS detection, Nmap scripts and saving scan results.
Continue ReadingDay 044 #FromZeroToHacker – Nmap Advanced Port Scans
We have just covered Nmap Basic Port Scans, including TCP flags and TCP 3-way handshake. Time for Nmap Advanced Port Scans 🙂
Continue ReadingDay 043 #FromZeroToHacker – Nmap Basic Port Scans
After discovering live hosts with Nmap, now is the time to go deeper by scanning their ports.
Continue ReadingDay 042 #FromZeroToHacker – Nmap Live Host Discovery
When we are about to attack a website, we want to know which systems are up and what services are running. Nmap can answer those questions.
Continue ReadingDay 041 #FromZeroToHacker – Pickle Rick Writeup
Time for a new Capture The Flag (CTF)! Pickle Rick is an easy room, but it is also the first CTF where we get no help.
Continue ReadingDay 040 #FromZeroToHacker – Upload Vulnerabilities
A basic introduction to sending and receiving (Both Reverse and Bind) shells when exploiting target machines.
Continue Reading