by InCIDRthreat | Nov 4, 2016 | hacking, PodCast Shownotes
HM Podcast 001 – Automating your Network Diagrams, Bug Bounties, and the Mirai Botnet Incidrthreat, hellor00t, and A1ph4byte are eager to give back to a community that hasn’t stopped giving us various challenges and is always pushing us to improve...
by n00py | Oct 26, 2016 | overthewire, tutorials
Recap of Last Lesson: We learned more about command injection and how to exploit it. We also revisited directory traversal attacks. Natas Level 10 Objective: Find the password to log into level 11. Intel Given: URL: http://natas10.natas.labs.overthewire.org/ Source...
by InCIDRthreat | Oct 25, 2016 | hacking, technology, tutorials
Linux Unified Key Setup, or LUKS [luhks] as it will be referred to as from here on out, is a widely used method of disk-encryption. LUKS is proprietary to the Linux Kernel and a device encrypted with LUKS will not mount in a Windows or Apple environment. LUKS can...
by n00py | Oct 17, 2016 | overthewire, tutorials
Recap of Last Lesson: We learned more about encoding in PHP and how to analyze functions. Natas Level 9 Objective: Find the password to log into level 10. Intel Given URL: http://natas9.natas.labs.overthewire.org/ Source code available How to: Like last time, it...
by InCIDRthreat | Jan 25, 2016 | hacking, tutorials
Introduction Source Code vs Executable Code Narnia Level 0 – Source Code Narnia Level 0 – Exploitation Narnia Level 0 – Solution Introduction This is an introduction to reverse engineering. I will be going through a series of reverse engineering...
by InCIDRthreat | Jan 6, 2016 | hacking, malware, security
Malware Types Malware can be classified by it’s behavior, target platform, or attack commands. Of the three classifications, we will look more specifically at malware based on behavior. These can be divided into 8 different categories: I. Infectors II. Network...
by hellor00t | Dec 30, 2015 | blog, hacking, reviews
Course Overview I recently completed and was awarded my SANS GCIA Certification. The GCIA or GIAC Intrusion Analyst certification is a course that focuses on learning how to configure intrusion detection systems (Snort, Bro, SiLK) and analyze logs, and network...
by hellor00t | Dec 26, 2015 | ctf, hacking
In an attempt to stay motivated and focus on my own individual projects while I’m not at work. I’m going to challenge myself to post more frequently in a blog-esqe style. Tutorials and technical write-ups will still come. I’m primarily using this...
by hellor00t | Dec 25, 2015 | blog
Happy Holidays everyone! I had some time to work on the site this week and decided to do some back end work. I’m hardly a website developer and to be completely frank I find website development and technologies frustrating at best. I did learn quite a few things...
by InCIDRthreat | Dec 16, 2015 | hacking, Hardware, security, technology
Basics RAM stands for Random-Access Memory and is commonly referred to as RAM or Memory for short. It serves as temporary storage and working space for the operating system and its applications. This allows data to be accessed (read or written) in almost real-time...