Recently I played ShadowCTF. Let’s see how I was able to solve few challenges.
All the cryptography challenges were awesome. ( Google search and Decodefr are my helping hands in Cryptography challenges.)
So let’s see what is inside “File”
Recently I participated in thecybergrabs CTF.
So let’s see how I was able to solve a few challenges.
So we have one JPG file. So first thought comes to my mind was to see the image metadata. So I used online metadata and EXIF viewer. (http://metapicz.com/#landing)
“Security is not merely a product, but a process” very well said by American Cryptographer Bruce Schneier.
Whether you are a small organization or a big organization Security is the biggest challenge nowadays. Governments are putting more weightage on data security by applying strict compliance/rules and due to an increase in cybersecurity attacks organization needs to have very good security mechanism implemented on their infrastructure.
Let’s understand what, why, how of infrastructure security assessment.
In simple words, we can describe it as
“ It is a method/way by which we are evaluating the security of different devices which are connected…
Today Let’s learn about the “dirsearch” tool.
It’s one of the best tools I came across to brute force directories and files.
So let’s see what developers of the dirsearch say about their tool.
dirsearch gives the user the opportunity to perform a complex web content discovery, with many vectors for the wordlist, high accuracy, impressive performance, advanced connection/request settings, modern brute-force techniques, and nice output.
Let’s not talk much about dirsearch let’s see how to use it.
Tiny software programs that configure the browsing experience are extensions.
Let’s build our first chrome Extension.
Step 1: Create a “manifest.json” file.
name: Name is the name of our extension which is visible to the users.
Most often, these virtual resources are not owned by the company that uses them but are provided by a service provider
Systems can interact with services and devices within the public cloud and on public networks and…
Recently I participated in MetaCTF 2020. I was running out of time because I have started solving challenges 2-hour before CTF ends. So due to that, I was able to solve a few challenges. Let’s see how I solved it