HTB Series #1 LAME

It has been quite a long time that I took out time and tried hands-on the vulnerable machines. I considered HTB to be the better place to resume my learning curve and here is the LAME machine and my write up about how I was able to find the flag. I am aware that there... Continue Reading →

Pumpkin Garden Walkthrough

Pumpkin Garden is the first level of Mission-pumpkin v1.0 which can be found here. As mentioned by the author Mission-Pumpkin v1.0 is a beginner level CTF series, created by keeping beginners in mind. This CTF series is for people who have basic knowledge of hacking tools and techniques but struggling to apply known tools. I believe... Continue Reading →

Credential Harvesting

Credential harvesting is one of the techniques used by attackers to gain credentials of users. The user will be presented an impersonated site with a form accepting user inputs [email address, username, password, SSN, credit card number, CVV, etc.]. Because of unawareness, the user fails to validate the authenticity of the web page presented to... Continue Reading →

Malware Analysis – Introduction

Malware is becoming a hot topic considering recent cyber attacks. If we want to define Malware, we can simply say any software which is having malicious intent.Mal(icious) + (Soft)ware = Malware As mentioned above, we can think what kind of malicious intent a person can have. Considering Information Security, we focus on triad which describes... Continue Reading →

Cryptocurrency – Illicit Mining

Cryptocurrency has been a popular word which stormed the internet after a jump in values of different cryptocurrencies. A sudden jump in worth invited many people to consider investing in cryptocurrencies. Let's build on basics before jumping to the darker side of cryptocurrency mining activities. The below snapshot shows the trend of cryptocurrency keyword over Google... Continue Reading →

Locky Ransomware

I bet, all of you would have come across phishing email with MS-Word or MS-Excel as an attachment. The content of the document will be gibberish prompting you to enable the macros included in the attached document. This technique was used by Locky Ransomware to make a way to our computers. We will discuss the same in... Continue Reading →

Non violent Cyber attack- STUXNET

All of us are familiar with  "Satyagraha" - the non violent movement followed by Mahatma Gandhi in order to attain freedom for our country. Probably this became an inspiration for other countries. Can you believe if I said that we now live in a world where a piece of code can destroy machinery and stop/start a... Continue Reading →

Spiral Model in SDLC

In the Spiral model, the software product is developed in small modules. Let us consider the figure shown below in developing a software product X. X is built by integrating A, B, C and D.   Ra- requirements analysis of module A. Similarly with Rb, Rc, Rd. Da – design of module A. Similarly with... Continue Reading →

Website Powered by

Up ↑