VulnHub Walkthrough: Kevgir

Greetings hackers! This week I endeavored on a hacking challenge to get root on Kevgir, a vulnerable image found at  https://www.vulnhub.com/entry/kevgir-1,137/

Below you will find my walkthrough detailing exactly how I compromised Kevgir. This walkthrough showcases enumeration techniques, password attacks, web application attacks, and a local privilege escalation technique.

Feel free to give this walkthrough a read. If you found a different way of hacking Kevgir I would love to hear about it in the comments.
Continue reading

Netcat – The Hacker’s Swiss Army Knife

Welcome back hackers! In this article, I will provide instruction on utilizing the awesome power of netcat. Commonly dubbed the swiss army knife of the hacker’s toolkit, netcat can do many things that are of use to hackers. After reading this article, you will learn how to perform the following functions using netcat:

  1. Establish a simple chat room.
  2. Perform Banner Grabbing.
  3. Establish bind and reverse shells.
  4. Transfer files between Kali and target.

Continue reading

First Post – Welcome to noob2root!

Welcome to noob2root. This blog is intended to provide hands on instruction on hacking techniques and practices. If you are an ethically minded enthusiast who is interested in getting into the fields of Information Security, Penetration Testing, and hacking, then this blog is for you. If you are inclined to use the techniques taught here for nefarious purposes, know that it is not only unethical, but highly illegal – unauthorized hacking is a surefire way to wind up in prison – so just don’t do it.

Now that that’s out of the way, we’ll move on to the good stuff.
Continue reading