by hellor00t | Oct 3, 2015 | hacking, Hardware, security, technology
Basics Network interface cards or NIC’s are what connect computers to networks. If you haven’t heard about it yet, the OSI Model is the concept that all computers use to communicate with each other. There are seven layers the begin with the physical layer...
by hellor00t | Sep 7, 2015 | hacking, overthewire, tutorials
Recap of Level 24: Created a little BASH script to cause a cron job. Bandit Level 25 Objective: Brute force the server listening on port 30002 using the password for Bandit 24. Intel Given: A daemon or service is listening on port 30002 Sending the password for...
by hellor00t | Aug 29, 2015 | electronics, technology
Introduction What is DOCSIS? What is downstream vs upstream? What are cable modem channels? What is channel bonding? What is QAM? Introduction If you’ve tried to purchase a cable modem recently, you’ll be met with a barrage of terminology that you may have never heard...
by hellor00t | Aug 27, 2015 | hacking
This is not a discussion on how to hack or program with python, it’s a discussion on why I personally chose python as my first programming language. I’m not a developer, I’ve never written a program from source code to production. So when I started looking for a...
by hellor00t | Aug 16, 2015 | hacking, security, tutorials
Google Dorking can technically be defined as a type of hacking by itself. The basic idea of Google Dorking is to used Google’s advanced search features/operators to obtain information about someone, or something. In general we know that Google Search is a big...