[General] I am moving
Hello there, I have relocated my site to embeddedhacker.com. This site will be remain active and all the update will goes to the given site. Visit now!
Hello there, I have relocated my site to embeddedhacker.com. This site will be remain active and all the update will goes to the given site. Visit now!
Hello there, welcome to another short and simple CTF challenge write-up from tryhackme. This challenge is a little bit different compared to the my other write-up. It involved CVE system or known as common vulnerabilities and exposures. CVE system provides a reference-method for publicly known information-security vulnerabilities and exposures. This made the challenge a little bit realistic. Without […]
What is an Arduino? Arduino is an open-source electronics platform based on easy-to-use hardware and software. Basically, I designed by computer hardware and Software Company OR user community to control or sense objects in the physical world. History of Arduino Arduino was born at Ivrea Interaction Design Institute (IIDI) as an easy tool for fast […]
This is yet another CTF challenge from tryhackme. This is my first blog post after the holiday and the challenge covers the very basic codes and hashes cracking. Hope you enjoy the write-up. Task 1: Translation and shifting This task required the challenger to perform a translation or shifting certain ciphers such as ROT13, ROT47, […]
Hello guys, it has been a while since I left this blog without saying goodbye. Guess what? My holiday comes to an end and it is time to continue my write up. Thank you for visiting my blog and sorry for taking my long leave without saying anything 🙂
On the last post, I talked about using the hashcat to crack various type of hashes. This walkthrough will heavily depend on the hashcat and ophcrack tool. ophcrack is basically a window password cracker based on the rainbow table. Without further ado, let’s begin the walkthrough. The walkthrough is based on this challenge. Task 1: […]
Thinking about posting your lifestyle, whereabouts and kind of food you are eating right now in social media? Then, you have to be very careful as people can monitoring you from somewhere else. For today post, I’m going to give you a general idea of how people (even FBI) can track you down on social […]
CTF or Capture the Flag is a special kind of information security competition. There are three common types of CTFs: Jeopardy, Attack-Defence and mixed (by ctftime). The challenge involves the knowledge of cryptography, steganography, reverse engineering and web hack. What can you gain from CTF challenge? The purpose of the CTF challenge is to improve […]
Today I was stumbled across a hacking challenge website called tryhackme. Multiple challenges can be found and each of the challenges is written by the community or individual. Feel free to sign up yourself and take part the challenges. Long story short, I will guide you on the challenge named crackthehash. This challenge is extremely […]
Either you are a beginner or advanced level hacker/pen-tester, I got something to introduce for you. Meet the website, hackthissite which provide an intensive challenge on the world of hacking. This website prepare tons of module for you to break it and the modules include Basic hacking challenge Realistic hacking challenge (website hacking) Application challenge […]
You must be logged in to post a comment.