by hellor00t | Nov 25, 2015 | security
Overview – Wireshark Workflow This is an example of my workflow for examining malicious network traffic. The traffic I’ve chosen is traffic from The Honeynet Project and is one of their challenges captures. For small pcaps I like to use Wireshark just...
by hellor00t | Oct 3, 2015 | hacking, Hardware, security, technology
Basics Network interface cards or NIC’s are what connect computers to networks. If you haven’t heard about it yet, the OSI Model is the concept that all computers use to communicate with each other. There are seven layers the begin with the physical layer...
by hellor00t | Sep 7, 2015 | hacking, overthewire, tutorials
Recap of Level 24: Created a little BASH script to cause a cron job. Bandit Level 25 Objective: Brute force the server listening on port 30002 using the password for Bandit 24. Intel Given: A daemon or service is listening on port 30002 Sending the password for...
by hellor00t | Aug 29, 2015 | electronics, technology
Introduction What is DOCSIS? What is downstream vs upstream? What are cable modem channels? What is channel bonding? What is QAM? Introduction If you’ve tried to purchase a cable modem recently, you’ll be met with a barrage of terminology that you may have never heard...
by hellor00t | Aug 27, 2015 | hacking
This is not a discussion on how to hack or program with python, it’s a discussion on why I personally chose python as my first programming language. I’m not a developer, I’ve never written a program from source code to production. So when I started looking for a...
by hellor00t | Aug 16, 2015 | hacking, security, tutorials
Google Dorking can technically be defined as a type of hacking by itself. The basic idea of Google Dorking is to used Google’s advanced search features/operators to obtain information about someone, or something. In general we know that Google Search is a big...
by InCIDRthreat | Aug 12, 2015 | Hardware, reviews, security, technology, tutorials
A few months back A1ph4byte, hellor00t, and I had a discussion about a project that would be both educational and useful. Despite being employed in the Network Security world, none of us had tinkered with pfSense in-depth prior to this venture. We mostly relied on...
by hellor00t | Jul 23, 2015 | blog, hacking, security
Many of the questions I see in r/howtohack or any computer security forum often are flooded with questions from beginners wondering how to get started in hacking. I hate to be the bearer of bad news but its going to be a lot of work. Lets discuss some of the major...
by hellor00t | Apr 25, 2015 | security
Overview This topic may be a bit basic for many regular visitors but I feel that it is important enough to be discussed. Many people often forget the simple things, this discussion is by no means all inclusive nor guarantees that you will be protected. What I hope to...
by hellor00t | Mar 29, 2015 | hacking, Hardware, security, technology, Tools, tutorials
Overview Today we’re going to go over the principals of wireless hacking, an example of a WPA2 hacking and then we will wrap it up with a few troubleshooting tips. Disclaimer: Before we begin let me preface this. Intrusion into anyone’s network without...