A crash course on the reverse engineering tool Ghidra

Intro:

GHIDRA is a tool created by the NSA that allows the user to analyze binaries. It is well known for it’s incredible de compiler which converts the assembly in the binary to C.

The GHIDRA download can be found here.

Note…

Perform memory forensics to find the flags

Introduction:

Perform memory forensics to find the flags. If you are having trouble, maybe check out the volatility room first.

Enjoy!

Please note: The size of the attached vmem file to download for each Task is large: 1.07 GB.

Here are some resources I…

Learn about and use Hydra, a fast network logon cracker, to bruteforce and obtain a website’s credentials.

Hydra Introduction:

What is Hydra?

Hydra is a brute force online password cracking program; a quick system login password ‘hacking’ tool.

We can use Hydra to run through a list and ‘bruteforce’ some authentication service. Imagine trying to…

An introduction to Windows

A little history:

Windows history:

On November 20, 1985 Microsoft announced its operating system named Windows which was a graphical operating system shell as a response to growing GUIs (graphical user interfaces). …

To exploit a website, you first need to know how they are created.

How websites work:

By the end of this room, you’ll know how websites are created and will be introduced to some basic security issues.

When you visit a website your browser (like Safari or Google Chrome) makes a request to…

Collecting your collection of hacker tools is excellent, but now it is customary to take one of the specialized distributions as a basis. …

SSL issues are still lurking in the wild. Can you exploit this web servers OpenSSL?

Background Information:

Introduction to Heartbleed and SSL/TLS

On the internet today, most web servers are configured to use SSL/TLS. SSL(secure socket layer) is just a predecessor to TLS(transport layer security). The most common versions are TLS 1.2…

A crash course on the topic of steganography

Intro:

Steganography(Stego) is the art of concealing something inside something else, for example: A message inside a jpg file, or a binary inside a png. Stego has been used since ancient times to deliver messages that they don’t want others seeing. In the…

A guided room taking you through infiltrating and exploiting a Linux system.

Intro:

Hello there my name is Pingu. I’ve come here to put in a request to get my fish back! My dad recently banned me from eating fish, as I wasn’t eating my vegetables. He locked all the fish…

A beginner orienteered guide on using the Tor network

Unit 1 — Tor:

Tor is a free and open-source software for enabling anonymous communication. Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user’s location and usage from anyone conducting network surveillance…

jagadeesh

CTF-PLAYER, security analyst, Pentesting, vapt, digital forensics

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store