Cyborg, es un reto un poco diferente a lo que suelo hacer, ya que para resolver el desafío que traigo se debe realizar primero una enumeración de la web, para posteriormente usar una aplicación de backup para recuperar los ficheros cifrados. Escaneo ...
🖥 SIEM, que significa "Sistema de Gestión de Información y Eventos de Seguridad", es una herramienta que recopila, analiza y correlaciona datos de seguridad provenientes de diferentes endpoints y puntos de la red. Estos datos se almacenan en un luga...
In penetration testing, your most important deliverable isn't the shell you popped or the number of vulnerabilities found — it's the report. A professional pentest report communicates your findings, their impact, and recommended fixes in a way that r...
Welcome to the "Year of the Rabbit" — a lighthearted CTF-style box that offers a balanced mix of enumeration, basic exploitation, steganography, and privilege escalation to warm up your hacking skills for the new year. In this walkthrough, we’ll use ...
Learn how to use simple tools such as traceroute, ping, telnet, and a web browser to gather information. Task 1 — Introduction Active reconnaissance requires you to make some kind of contact with your target. This contact can be a phone call or a vi...
As a teenager in Nepal, I’ve been fascinated by how computers and the internet work. I remember breaking my own computer a few times—and fixing it, sometimes with help from YouTube! That early curiosity slowly turned into a deeper interest in underst...
Welcome to the Evil-GPT V2 Room on Try Hack Me! This walkthrough for the Evil-GPT V2 Room on TryHackMe is for educational purposes only. The author assumes no responsibility for any misuse or damage resulting from the use of this walkthrough. Unauth...
In this task, we explore the fundamentals of enumeration, exploitation, and privilege escalation on a vulnerable machine. By leveraging tools like Nmap, Gobuster, cURL, John the Ripper, and Steghide, we methodically uncover hidden directories, decode...
How I Started My Cybersecurity Journey as a Student (ShellSc0ut’s First Shell) Hey everyoneI’m Suman, also known as ShellSc0ut — a 2nd-year BCA student who just started exploring the world of cybersecurity. This blog marks my first shell, my first st...
Welcome to the walkthrough of "TryHackMe Vol.1", a fun and beginner-friendly Capture The Flag (CTF) room created to test and improve your fundamental cybersecurity and problem-solving skills. This room consists of 20 short, easy challenges, each desi...