Blog
Passwords – Cracking Hashes
Password Safeguards Password Strength Password strength or complexity is the goal of having a good password and making it strong against brute-force attacks. ab where a is the possible symbols and b is the length. If you have a 4 letter password containing only [0-9]...
Company Update 01
Hey guys & gals its been a bit since we've had a tutorial or a blog post. Well that's because we've been busy! As you can see the site got yet another facelift, hopefully a change that uncluttered the site and is easier to navigate. We also added a forum and we...
HM Podcast001 – Introduction and History
HM Podcast 001 - Automating your Network Diagrams, Bug Bounties, and the Mirai Botnet Incidrthreat, hellor00t, and A1ph4byte are eager to give back to a community that hasn't stopped giving us various challenges and is always pushing us to improve ourselves as nerds....
OvertheWire – Natas 10
Recap of Last Lesson: We learned more about command injection and how to exploit it. We also revisited directory traversal attacks. Natas Level 10 Objective: Find the password to log into level 11. Intel Given: URL: http://natas10.natas.labs.overthewire.org/ Source...
Using LUKS
Linux Unified Key Setup, or LUKS [luhks] as it will be referred to as from here on out, is a widely used method of disk-encryption. LUKS is proprietary to the Linux Kernel and a device encrypted with LUKS will not mount in a Windows or Apple environment. LUKS can...
OvertheWire – Natas 9
Recap of Last Lesson: We learned more about encoding in PHP and how to analyze functions. Natas Level 9 Objective: Find the password to log into level 10. Intel Given URL: http://natas9.natas.labs.overthewire.org/ Source code available How to: Like last time, it...