by ArtificialAmateur | Jun 3, 2017 | hacking, Hardware, roadmap, security, technology
Basics The GPU is the graphics processing unit, sometimes referred to as graphics card or visual processing unit (VPU). Commonly used for processing imagery, it is used to handle resource intensive computations that may overload your standard Central Processing Unit...
by ArtificialAmateur | Jun 3, 2017 | hacking, roadmap
Password Safeguards Password Strength Password strength or complexity is the goal of having a good password and making it strong against brute-force attacks. ab where a is the possible symbols and b is the length. If you have a 4 letter password containing only [0-9]...
by InCIDRthreat | Nov 4, 2016 | hacking, PodCast Shownotes
HM Podcast 001 – Automating your Network Diagrams, Bug Bounties, and the Mirai Botnet Incidrthreat, hellor00t, and A1ph4byte are eager to give back to a community that hasn’t stopped giving us various challenges and is always pushing us to improve...
by InCIDRthreat | Oct 25, 2016 | hacking, technology, tutorials
Linux Unified Key Setup, or LUKS [luhks] as it will be referred to as from here on out, is a widely used method of disk-encryption. LUKS is proprietary to the Linux Kernel and a device encrypted with LUKS will not mount in a Windows or Apple environment. LUKS can...
by InCIDRthreat | Jan 25, 2016 | hacking, tutorials
Introduction Source Code vs Executable Code Narnia Level 0 – Source Code Narnia Level 0 – Exploitation Narnia Level 0 – Solution Introduction This is an introduction to reverse engineering. I will be going through a series of reverse engineering...
by InCIDRthreat | Jan 6, 2016 | hacking, malware, security
Malware Types Malware can be classified by it’s behavior, target platform, or attack commands. Of the three classifications, we will look more specifically at malware based on behavior. These can be divided into 8 different categories: I. Infectors II. Network...