In this series we will be hosting a remote VPS (Virtual Private Server) which can be accessed from any part of the world using a raspberry pi 4. So let’s first learn a bit about raspberry pies.
What is a Raspberry Pi?
The Raspberry Pi is a low cost, credit-card sized computer that plugs into a computer monitor or TV, and uses a standard keyboard and mouse.
It is a capable little device that enables people of all ages to explore computing, and to learn how to program in languages like Scratch and Python. It’s capable of doing everything you’d…
Hey guys! This is an informative blog about topics you must know before your interview. If you learn anything new then please share it with your friends. This part is focus on the pentesting based questions.
Pentest based questions :-
Same Origin Policy is a web browser security mechanism that aims to prevent websites from attacking each other. SOP restricts scripts on one origin from accessing data from another origin. An origin consists of a URI scheme, domain and port number.
For Example —
This uses the scheme http, the domain website.com and the port number 80…
Hey guys! This is an informative blog about topics you must learn before your interview. If you learn anything new then please share it with your friends. This part is focus on the networking based questions.
OSI model and layers :-
The Open Systems Interconnection (OSI) model is a conceptual model created by the International Organization for Standardization which enables diverse communication systems to communicate using standard protocols. In plain English, the OSI provides a standard for different computer systems to be able to communicate with each other.
VII. Application Layer :- Human-Computer interaction layer, where applications can access the…
Hey Guys! This is a write up for the room ultratech on TryHackMe.
UltraTech is a medium level room and to solve this you need to know the basics of Penetration Testing, Enumeration, Privilege Escalation and Webapp testing.
Let’s begin our reconnaissance by scanning ports and services with nmap.
nmap -sC -sV -p- -v -oN nmapall <IP>
# Nmap 7.91 scan initiated Fri Jan 15 13:49:25 2021 as: nmap -sV -sC -p- -v -oN nmapall -T4 10.10.43.96
Warning: 10.10.43.96 giving up on port because retransmission cap hit (6).
Nmap scan report for 10.10.43.96
Host is up (0.14s latency).
Not shown: 65521 closed ports
Hey Guys! This is a write up for the room dogcat on TryHackMe.
Dogcat is a medium level room and to solve this you need to have knowledge of LFI(Local File Inclusion), PHP and some linux basics with privilege escalation .
We’ll start our reconnaissance by port scanning with nmap by checking the open ports and services running on them.
nmap -sV -sC -oN nmap <IP>
# Nmap 7.91 scan initiated Wed Jan 6 00:16:56 2021 as: nmap -sV -sC -oN nmap 10.10.70.53
Nmap scan report for 10.10.70.53
Host is up (0.14s latency).
Not shown: 994 closed ports
Hey Guys! This is a write up for anonymous on TryHackMe.
Anonymous is a medium level room however, it’s really easy to complete. All you need to know is basic knowledge of Linux and some privilege escalation.
There are several ways to do this but, we’ll go with the quickest route.
First step is to begin a Nmap scan to find the open ports and services with the command:
Nmap -sC -sV -oN nmap 10.10.49.239
# Nmap 7.91 scan initiated Thu Dec 17 16:10:12 2020 as: nmap -sC -sV -oN nmap 10.10.49.239
Nmap scan report for 10.10.49.239
Host is up (0.14s…
Hey guys! We’ ll be solving the Anthem room from TryHackMe.
Reading the description gives a brief idea that it’s a windows server and we just need to user a browser and remote desktop.
We first did a nmap scan to find open ports and services running by entering the command
“nmap -sC -sV -oN nmap 10.10.132.2”.
# Nmap 7.91 scan initiated Wed Dec 9 14:53:08 2020 as: nmap -sC -sV -oN nmap 10.10.132.2
Nmap scan report for 10.10.132.2
Host is up (0.13s latency).
Not shown: 995 closed ports
PORT STATE SERVICE…
The technology can be helpful but harmful at the same time. As we all know, Sending emails or sensitive information through the internet can be nail-biting. Hackers are so advanced that they might be even monitoring us, our emails, social media accounts or bank accounts. So, how do we communicate without having the information leaked. We have a Pretty Good solution for this problem which is “Pretty Good Privacy(PGP)”.
PGP was created back in 1991 by Phil Zimmermann(Software Engineer) He was an anti-nuclear activist, and wanted a way to transfer information securely over the Internet. …
Penetration tester | Ethical Hacker