Open in app

Sign In

Write

Sign In

jagadeesh
jagadeesh

19 Followers

Home

About

Apr 9, 2021

Tryhackme:CC: Ghidra

A crash course on the reverse engineering tool Ghidra Intro: GHIDRA is a tool created by the NSA that allows the user to analyze binaries. It is well known for it’s incredible de compiler which converts the assembly in the binary to C. The GHIDRA download can be found here. Note…

5 min read

Tryhackme:CC: Ghidra
Tryhackme:CC: Ghidra

5 min read


Apr 9, 2021

Tryhackme:Memory Forensics

Perform memory forensics to find the flags Introduction: Perform memory forensics to find the flags. If you are having trouble, maybe check out the volatility room first. Enjoy! Please note: The size of the attached vmem file to download for each Task is large: 1.07 GB. Here are some resources I…

3 min read

Tryhackme:Memory Forensics
Tryhackme:Memory Forensics

3 min read


Apr 8, 2021

Tryhakme:Hydra

Learn about and use Hydra, a fast network logon cracker, to bruteforce and obtain a website’s credentials. Hydra Introduction: What is Hydra? Hydra is a brute force online password cracking program; a quick system login password ‘hacking’ tool. We can use Hydra to run through a list and ‘bruteforce’ some authentication service. Imagine trying to…

4 min read

Tryhakme:Hydra
Tryhakme:Hydra

4 min read


Apr 1, 2021

Tryhackme:Intro to Windows

An introduction to Windows A little history: Windows history: On November 20, 1985 Microsoft announced its operating system named Windows which was a graphical operating system shell as a response to growing GUIs (graphical user interfaces). …

Tryhackme

18 min read

Tryhackme:Intro to Windows
Tryhackme:Intro to Windows
Tryhackme

18 min read


Mar 31, 2021

Tryhackme:How websites work

To exploit a website, you first need to know how they are created. How websites work: By the end of this room, you’ll know how websites are created and will be introduced to some basic security issues. When you visit a website your browser (like Safari or Google Chrome) makes a request to…

7 min read

Tryhackme:How websites work
Tryhackme:How websites work

7 min read


Mar 31, 2021

Operating systems for hacking

Collecting your collection of hacker tools is excellent, but now it is customary to take one of the specialized distributions as a basis. …

11 min read

Operating systems for hacking
Operating systems for hacking

11 min read


Mar 29, 2021

Tryhackme:HeartBleed

SSL issues are still lurking in the wild. Can you exploit this web servers OpenSSL? Background Information: Introduction to Heartbleed and SSL/TLS On the internet today, most web servers are configured to use SSL/TLS. SSL(secure socket layer) is just a predecessor to TLS(transport layer security). The most common versions are TLS 1.2…

4 min read

Tryhackme:HeartBleed
Tryhackme:HeartBleed

4 min read


Mar 28, 2021

Tryhackme:CC: Steganography

A crash course on the topic of steganography Intro: Steganography(Stego) is the art of concealing something inside something else, for example: A message inside a jpg file, or a binary inside a png. Stego has been used since ancient times to deliver messages that they don’t want others seeing. In the…

5 min read

Tryhackme:CC: Steganography
Tryhackme:CC: Steganography

5 min read


Mar 28, 2021

Tryhackme:The Cod Caper

A guided room taking you through infiltrating and exploiting a Linux system. Intro: Hello there my name is Pingu. I’ve come here to put in a request to get my fish back! My dad recently banned me from eating fish, as I wasn’t eating my vegetables. He locked all the fish…

10 min read

Tryhackme:The Cod Caper
Tryhackme:The Cod Caper

10 min read


Mar 27, 2021

Tryhackme:Tor

A beginner orienteered guide on using the Tor network Unit 1 — Tor: Tor is a free and open-source software for enabling anonymous communication. Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user’s location and usage from anyone conducting network surveillance…

4 min read

Tryhackme:Tor
Tryhackme:Tor

4 min read

jagadeesh

jagadeesh

19 Followers

CTF-PLAYER, security analyst, Pentesting, vapt, digital forensics

Following
  • Heart Bleed

    Heart Bleed

  • HackerOne

    HackerOne

  • Katie Paxton-Fear

    Katie Paxton-Fear

  • Splunk

    Splunk

  • TryHackMe

    TryHackMe

See all (5)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech