Stego Hunter
Initial reconnaissance I started by inspecting the file metadata to see if anything obvious was embedded in EXIF or visible comments. I ran exiftool hunter.jpg to check for metadata and then used ...
Initial reconnaissance I started by inspecting the file metadata to see if anything obvious was embedded in EXIF or visible comments. I ran exiftool hunter.jpg to check for metadata and then used ...
Service Enumeration with Nmap I begun assessment with an Nmap service and version detection scan against the target host 10.129.233.32. The scan revealed several open ports, including SSH on port ...
What Is Redis? Redis (REmote DIctionary Server) is an open-source, in-memory key-value database. It stores data primarily in RAM, making it extremely fast. It supports multiple data structures suc...
What Is SQL Injection? SQL Injection (SQLi) is a type of code injection attack where an attacker manipulates SQL queries by inserting malicious SQL statements into input fields such as login forms...
To identify hosts running SMB services on the 10.5.5.0/24 network, I used the Nmap command nmap -p 139,445 –open 10.5.5.0/24 to scan for open TCP ports commonly associated with SMB: port 139 (NetBI...
DNS Exfiltration Analysis Learn more about DNS tunneling detection Introduction DNS is a foundational internet protocol used to resolve domain names into IP addresses. However, due to its ...
Introduction In this lab, we analyze a captured WPA handshake wpa.cap to demonstrate the process of cracking a Wi-Fi password using dictionary-based attacks. WPA2-PSK (Wi-Fi Protected Access) secu...