information gathering

Shell Scripting Program to check if a Number is Palindrome

Palindrome Numbers are the numbers whose reverse will also give you the same number. For Example, 567 is not a palindrome number because the reverse of 567 is 765 which is not same as the number, whereas 8778 is a […]

Program to find GCD of two numbers in C language

The following program is to find the GCD or HCF of a number using C Language. GCD is the Greatest Common Divisor that divides a particular number. #include<stdio.h> void main(){ int a,b,i,j; printf(“\n****************************\nprogram to find GCD of 2 Numbers\n*****************************\n\n”); printf(“Enter […]

Bash Program to check if a number is Armstrong:Shell Scripting

Shell scripting is a command line scripting language used by Unix- Like environment. The below program is a Bash program to check if a number is Armstrong or not. Whats is Armstrong number? An Armstrong number of three digits is […]

Program to convert a Character into ASCII value using C Language

In C language, The integer value for a character is always it’s ASCII value. So If you want to print an ASCII value of a character in C then simply use %d to get the character’s ASCII integer value. Code: […]


This article is continuation of the over the wire bandit series. In case you haven’t read that here it is OVERTHEWIRE:BANDIT WALKTHROUGH SERIES 1-5 LEVELS. So let’s start with the level 6. I logged in level 6 with the credentials I […]

Diffie Hellman Key Exchange: What it is?

What is Diffie Hellman? It is an asymmetric key exchange algorithm which allows two parties to agree upon a shared secret key in such a way that no other person can eavesdrop on the communication. It uses two different keys […]

Caesar Cipher Program in C

What is Caesar Cipher? Caesar Cipher is a Symmetric Cryptography model, with the term Symmetric, I mean that that key which is used for both encryption and decryption are same. This is the earliest model which is used by Julius […]

How to become a Hacker?

Hacker is a person who can gain unauthorized access to  a device. Many people have this question in their mind, “How to become one?”. Before I give answer to this question, I would like to explain the concept of everything […]

Information Gathering(Reconnaissance/Footprinting)

This is the very first step for any kind of hacking(White,Grey,Black).Information Gathering as the name suggests, is gathering as much information about the target as possible.Hackers or Security Experts need to create a information database before attacking a target, it […]

%d bloggers like this: