Blog

ODIN: 1 -VulnHub Walkthrough

Hello everyone, Today I am here with new challenge. Odin 1 – It is an easy Vulnhub challenge. Come lets see more about the challenge. As you have seen in our old blog Potato:1 we follow the same PTES standards for this machine too. You  can download the machine here: https://www.vulnhub.com/entry/odin_1,619/ Information Gathering: Lets find

Read More

Shocker- Hackthebox Walkthrough

Hi Everyone, I’m back with another HACKTHEBOX walkthrough today. This machine is for those who are preparing for the OSCP exams. Get root and find the flag would be our task here. So, let’s get down to work. First Lets do the Information gathering, we can start with finding the ports and services running. #

Read More

Understanding Cryptography

Today in this digital world, we have many technologies protecting our data. The use of passwords, authenticators, and cryptography are some of them. We have seen the importance of a strong password discussed in our previous article “Password Audits”. Passwords and authenticators are a level of security used to verify that you are who you

Read More

Passwords Audit – Why and What are the risks

Passwords have become part of our daily lives. Passwords are extra protection to our personal and business data. They are often the first line of defense and, in many cases, the only line of defense against data breaches. A password can be anything like your mobile unlock PIN, ATM PIN, login password, etc.   It is very critical to protect the password even if

Read More