by InCIDRthreat | Feb 20, 2019 | hacking, tutorials
Introduction Narnia a series of reverse engineering puzzles developed by OverTheWire and is an introduction to reverse engineering. Below is the methodology used to solve these puzzles. Login and Execution In the previous level, Narnia 0, we covered the difference...
by InCIDRthreat | Dec 31, 2018 | blog
Before we get into it… Let’s start this off the right way. Thank you readers, community contributors, and supporters! We say this every year and each year it means more to us than you will know. As the Information Security community continues to grow, we...
by InCIDRthreat | Dec 28, 2018 | blog, hacking, security
Whether you’re in a small business or in a multi-million dollar company, you’d surely want to fortify and maintain your networks physical and IP security by having penetration testing. There may be a lot of pentest companies and professionals out there, but hiring...
by InCIDRthreat | Nov 4, 2016 | hacking, PodCast Shownotes
HM Podcast 001 – Automating your Network Diagrams, Bug Bounties, and the Mirai Botnet Incidrthreat, hellor00t, and A1ph4byte are eager to give back to a community that hasn’t stopped giving us various challenges and is always pushing us to improve...
by InCIDRthreat | Oct 25, 2016 | hacking, technology, tutorials
Linux Unified Key Setup, or LUKS [luhks] as it will be referred to as from here on out, is a widely used method of disk-encryption. LUKS is proprietary to the Linux Kernel and a device encrypted with LUKS will not mount in a Windows or Apple environment. LUKS can...