This week we take a look at the CTF Walkthrough for HackDay: Albania. Get ready for a challenge that requires keen attention to detail, and lots of persistence.
During this post, we will examine how to hack PwnLab, from vulnhub.com.
Today I attempted (and passed) the SANS GIAC Security Essentials (GSEC) certification exam. I wanted to take a moment and write a review of the course and offer my experience in preparing and taking the GSEC exam. So let’s get started!
Greetings hackers! This week I endeavored on a hacking challenge to get root on Kevgir, a vulnerable image found at https://www.vulnhub.com/entry/kevgir-1,137/
Below you will find my walkthrough detailing exactly how I compromised Kevgir. This walkthrough showcases enumeration techniques, password attacks, web application attacks, and a local privilege escalation technique.
Feel free to give this walkthrough a read. If you found a different way of hacking Kevgir I would love to hear about it in the comments.
Welcome back hackers! In this article, I will provide instruction on utilizing the awesome power of netcat. Commonly dubbed the swiss army knife of the hacker’s toolkit, netcat can do many things that are of use to hackers. After reading this article, you will learn how to perform the following functions using netcat:
- Establish a simple chat room.
- Perform Banner Grabbing.
- Establish bind and reverse shells.
- Transfer files between Kali and target.
Welcome to noob2root. This blog is intended to provide hands on instruction on hacking techniques and practices. If you are an ethically minded enthusiast who is interested in getting into the fields of Information Security, Penetration Testing, and hacking, then this blog is for you. If you are inclined to use the techniques taught here for nefarious purposes, know that it is not only unethical, but highly illegal – unauthorized hacking is a surefire way to wind up in prison – so just don’t do it.
Now that that’s out of the way, we’ll move on to the good stuff.