by hellor00t | Dec 30, 2015 | blog, hacking, reviews
Course Overview I recently completed and was awarded my SANS GCIA Certification. The GCIA or GIAC Intrusion Analyst certification is a course that focuses on learning how to configure intrusion detection systems (Snort, Bro, SiLK) and analyze logs, and network...
by hellor00t | Dec 26, 2015 | ctf, hacking
In an attempt to stay motivated and focus on my own individual projects while I’m not at work. I’m going to challenge myself to post more frequently in a blog-esqe style. Tutorials and technical write-ups will still come. I’m primarily using this...
by InCIDRthreat | Dec 16, 2015 | hacking, Hardware, security, technology
Basics RAM stands for Random-Access Memory and is commonly referred to as RAM or Memory for short. It serves as temporary storage and working space for the operating system and its applications. This allows data to be accessed (read or written) in almost real-time...
by hellor00t | Oct 3, 2015 | hacking, Hardware, security, technology
Basics Network interface cards or NIC’s are what connect computers to networks. If you haven’t heard about it yet, the OSI Model is the concept that all computers use to communicate with each other. There are seven layers the begin with the physical layer...
by hellor00t | Sep 7, 2015 | hacking, overthewire, tutorials
Recap of Level 24: Created a little BASH script to cause a cron job. Bandit Level 25 Objective: Brute force the server listening on port 30002 using the password for Bandit 24. Intel Given: A daemon or service is listening on port 30002 Sending the password for...
by hellor00t | Aug 27, 2015 | hacking
This is not a discussion on how to hack or program with python, it’s a discussion on why I personally chose python as my first programming language. I’m not a developer, I’ve never written a program from source code to production. So when I started looking for a...