Posts

TryHackMe Blue | CTF Walkthrough

Image
  This article is about  Blue  capture the flag created by  P ritam Kumar Mukhopadhyay  on  TryHackMe . It is a free room and everyone can join it after log-in to the website. Description: Deploy & hack into a Windows machine, leveraging common misconfigurations issues. Video Link is given at the end of the document you can check there. This challenge teaches us how a small misconfiguration can end up your whole machine hacked. Let’s get started.       RECON      As we have get machine’s IP, let’s scan it with nmap.     So we scan the machine for open ports but faster               Now next step is need to know the services and the service versions running on the open ports.     This will take time based on the performance of your system.              There are different scripts present in nmap, so to know about the vuln...

Crack Zip Passwords

Image
       John the Ripper is a free password cracking software tool. Originally developed for the Unix operating  system, it can run on fifteen different platforms. John the Ripper works  by using the dictionary method favoured by attackers as the easiest way to guess a password. I t takes text string samples from a word list using common dictionary words. It can also deal with encrypted passwords, and address online and offline attack JOHN THE RIPPER DOWNLOAD LINK:-                      https://www.openwall.com/john/     CODES FOR JOHN THE RIPPER     Loading hashes and saving it into the file:-                       Cracking hashes using default wordlist :-                 Cracking hashes using wordlist :-              ...

SETTING UP YOUR HACKING LAB AT HOME

Image
                To See how to setup the things follow the steps:-                                                                                                       Setting up hacking lab  
Image
  Socket Programming in Python  Sockets and the socket API are used to send messages across a network. They provide a form of inter process communication. The network can be a logical, local network to the computer, or one that’s physically connected to an external network, with its own connections to other networks.     Echo Server #!/usr/bin/env python3 import socket HOST = '127.0.0.1' # Standard loopback interface address (localhost) PORT = 65432 # Port to listen on (non-privileged ports are > 1023) with socket . socket ( socket . AF_INET , socket . SOCK_STREAM ) as s : s . bind (( HOST , PORT )) # associating with specific network interface and port number s . listen () # listening for incoming connections conn , addr = s . accept () # accepting the connections with conn : print ( 'Connected by' , addr ) while True : data = conn . recv ( 1024 ) # recieve da...