by InCIDRthreat | Dec 31, 2018 | blog
Before we get into it… Let’s start this off the right way. Thank you readers, community contributors, and supporters! We say this every year and each year it means more to us than you will know. As the Information Security community continues to grow, we...
by InCIDRthreat | Dec 28, 2018 | blog, hacking, security
Whether you’re in a small business or in a multi-million dollar company, you’d surely want to fortify and maintain your networks physical and IP security by having penetration testing. There may be a lot of pentest companies and professionals out there, but hiring...
by InCIDRthreat | Nov 4, 2016 | hacking, PodCast Shownotes
HM Podcast 001 – Automating your Network Diagrams, Bug Bounties, and the Mirai Botnet Incidrthreat, hellor00t, and A1ph4byte are eager to give back to a community that hasn’t stopped giving us various challenges and is always pushing us to improve...
by InCIDRthreat | Oct 25, 2016 | hacking, technology, tutorials
Linux Unified Key Setup, or LUKS [luhks] as it will be referred to as from here on out, is a widely used method of disk-encryption. LUKS is proprietary to the Linux Kernel and a device encrypted with LUKS will not mount in a Windows or Apple environment. LUKS can...
by InCIDRthreat | Jan 25, 2016 | hacking, tutorials
Introduction Source Code vs Executable Code Narnia Level 0 – Source Code Narnia Level 0 – Exploitation Narnia Level 0 – Solution Introduction This is an introduction to reverse engineering. I will be going through a series of reverse engineering...