Category: Miscellaneous

  • Cyborg – TryHackMe Walkthrough

    Cyborg – TryHackMe Walkthrough

    A step-by-step TryHackMe Cyborg walkthrough to achieve root access. Learn essential techniques for web enumeration, SSH access, and privilege escalation.

  • Log4Shell Quick Lab Setup for Testing

    Log4Shell Quick Lab Setup for Testing

    Last month, On December 09 2021, The release of a Remote Code Execution POC over twitter involving exploitation of Apache’s log4j2 logging class took everyone’s peace away. The attack was pretty simple and the fact that it can be easily exploited by anyone is what made this more terrifying. The first edition of this attack…

  • Insecure Code Management – Git

    Insecure Code Management – Git

    Insecure code management is when part of the code exposes sensitive information which shouldn’t be exposed to the world. Now it can happen in a lot of situation where the API keys/Passwords are hard-coded and it has been shared mistakenly by the developers. This article will cover the part of Git version control feature and…

  • How to setup your own Basic Telemetry Lab with Cisco XR

    How to setup your own Basic Telemetry Lab with Cisco XR

    In this article, we will be talking about setting up a basic Lab for testing Telemetry on a Cisco NC55XX router. Telemetry – “Tele” means remote, “metry” means metrics or measurements, together this word simply means to collect data/measurements remotely on a server. Telemetry is usually a PUSH model meaning the client will push data…

  • Ease in Automation: Convert Router Output to Json Format

    Ease in Automation: Convert Router Output to Json Format

    In this article we will be talking about converting the output from Cisco XR into a Json File for further utilization or automation. The following code can be used and can be redesigned to work with several other commands and output in other variants of Cisco XE, XR etc., as well as other vendor devices.…

  • Fixing VMware “Fit Guest Now” Feature in Kali-linux: Solved

    Fixing VMware “Fit Guest Now” Feature in Kali-linux: Solved

    Recently, while upgrading my virtual machine, I was stumbled upon Greyed-out Fit Guest Now option. This is pretty exhausting as it only shows the console window but not the full Guest view. I took the following steps to make vmtools work again so I can get Fit Guest Now again: I uninstalled my VMware tools…

  • Pubg Stuck on Loading Screen and Ping Error Solutions Android

    Pubg Stuck on Loading Screen and Ping Error Solutions Android

    Pubg (PlayerUnknown’s Battlegrounds) is being played world wide now. So many users is proportional to so many error. I have been playing pubg for about a week now and faced the following problems: 1. The selected server may have higher ping. 2. After Clicking on Start, The game keeps loading and the player’s arena doesn’t come…

  • Bruteforcing FTP using ftplib: Hacking with Python

    Bruteforcing FTP using ftplib: Hacking with Python

    The article will guide you on how to bruteforce FTP using ftplib library in python. I have already posted an article on how to check for anonymous FTP script. FTP is File transfer protocol which is used to upload/download files from server to client. It works on Port 21. FTPLIB provides many features to python…

  • Boolean Based Blind SQL Injection on MySQL: How to do manually

    Boolean Based Blind SQL Injection on MySQL: How to do manually

    This article will guide you on how to do Blind Boolean SQL Injection. As I have already told you in the last article that Blind SQL Injection is more like a guessing game and it is time consuming. An automated way is going to save your time but that way you won’t be able to…

  • Program to find number of words,vowels,spaces,special chars and consonants in sentence using C

    Program to find number of words,vowels,spaces,special chars and consonants in sentence using C

    C language provides many libraries to handle strings. The libraries that we are going to be using are ctype and string. If you are working in C and you require to manipulate a string, ctype and string header files are your friends! Make use of them. Explanation The functions of ctype.h used in the program…

  • Creating Your Own hacking Lab: The Beginner’s guide

    Creating Your Own hacking Lab: The Beginner’s guide

    This article is a beginner’s level guide to create your own hacking lab so you can practice in a safe environment. With your own hacking lab set up, you can work without boundaries and explore more. I will be telling you about the software tools and their configuration and how you can configure network as…

  • VirtualBox NAT settings: How to configure so they don’t have same IPs?

    VirtualBox NAT settings: How to configure so they don’t have same IPs?

    I am writing this article because I have been through a configuration problem while setting up NAT network in VirtualBox. The problem: Both my machines getting the same IP addresses after selecting NAT as the network for both. I just start using VirtualBox, I used to use VMware. To solve this problem, follow these steps:…