Here is the basic rating from best to worst of the modern WiFi security methods available on modern routers:
WPA2 + AES
WPA + AES
WPA + TKIP/AES (TKIP is there as a fallback method)
WPA + TKIP
WEP — >Open Network (no security at all)
The best way to go is to deactivate Wi-Fi Protected Setup (WPS) and set the router to WPA2 +AES. As you go down the list, you are getting less security for your network.
Both WPA and WPA2 are supposed to secure wireless Internet networks from unauthorized access. If you leave your router with no…
You found a secret server located under the deep sea. Your task is to hack inside the server and reveal the truth.
This walkthrough is written as a part of Master certificate in cybersecurity (Red Team) that I am pursuing from HackeU.
Starting with a nmap scan
nmap -sS -sV <ip>
A beginner-friendly CTF challenge
This machine is brilliant for new starters. You will have to enumerate this machine by finding open ports, do some online research (its amazing how much information Google can find for you), decoding hashes, brute forcing a pop3 login and much more!
boot2root machine for FIT and bsides guatemala CTF you can access it from here.
This walkthrough is written as a part of Master’s certificate in cybersecurity (Red Team) that I am pursuing from HackeU.
Firstly we have to make a connection with VPN or use the attack box on the Tryhackme site to connect to the Tryhackme lab environment.
boot2root machine for FIT and bsides guatemala CTF.
This is the write up for the room Library on TryHackMe website you can access it from here.
This room involves SSH, brute-forcing, using python payload for privilege escalation, and playing around with the permission that a low-privileged user has.
Before deploying the machine make sure you have you VPN ready.
Beginner level ctf (capture the flag).
This is the write up for the room Simple CTF on Tryhackme. You can access the Lab from here.
Firstly we have to make connection with VPN or use the attackbox on Tryhackme site to connect to the Tryhackme lab environment.
First deploy the machine after that we will get the Target system IP.