HACKS

April 9, 2019

Hackfest 2016: Quaoar – Vulnhub Walkthrough

Hackfest 2016: Quaoar – Vulnhub Walkthrough I have to say this is the easiest VM I have done so far Quaoar is the first machine from […]
April 9, 2019

DerpNStink VulnHub — Walkthrough

DerpNStink is the web based vulnerable machine The best thing of this machine is that different techniques are involved in exploiting the vulnerabilities and you have […]
April 9, 2019

Kioptrix: Level 3 Vulnhub — Walkthrough

GOAL The object of the game is to acquire root access Victim Description: Based on reviewing the VulnHub.com site, the listed vulnerabilities are File Inclusion Improper […]
April 8, 2019

Kioptrix: Level 2 (1.1) Vulnhub — Walkthrough

GOAL The object of the game is to acquire root access via any means possible (except actually hacking the VM server or player). The purpose of […]
April 8, 2019

Kioptrix: Level 1 Vulnhub — Walkthrough

Kioptrix is a boot to root virtual machine for pentesting testing hosted on Vulnhub. Machine Description: This Kioptrix VM Image are easy challenges. The object of […]
March 26, 2019

How To Schedule A Shutdown For Windows OS?

How To Schedule A Shutdown For Windows OS? The very first task we learnt was to Turn ON and Shutdown Windows when we were kids, and […]
March 26, 2019

10 Linux Dig (Domain Information Groper) Commands to Query DNS

10 Linux Dig (Domain Information Groper) Commands to Query DNS Dig stands for (Domain Information Groper) is a network administration command-line tool for querying Domain Name System (DNS) name […]
March 26, 2019

A To Z List of Linux Commands | Linux Command Line Reference

A To Z List of Linux Commands | Linux Command Line Reference Is Linux CLI case-sensitive? The answer is, yes. If you try to run LS instead […]
March 26, 2019

A to Z List Of Windows CMD Commands You Need To Know

A to Z List Of Windows CMD Commands You Need To Know CMD is a command line interpreter – a program designed to understand the commands […]
March 23, 2019

Cyber Espionage Increasingly Common Among Governments

Cyber Espionage Increasingly Common Among Governments In the wake of increased cyber activities among governments globally, it is no doubt that some countries will employ whatever […]