Posts for: #Cybersec

  1. Nmap Cheat Sheet


Scanning Options

Option What It Does Example Command
10.10.10.0/24 Specifies the target network range. nmap 10.10.10.0/24
-sn Skips port scanning. nmap -sn 10.10.10.0/24
-Pn Disables ICMP Echo Requests (no ping). nmap -Pn 10.10.10.0/24
-n Avoids DNS resolution. nmap -n 10.10.10.0/24
-PE Ping scan using ICMP Echo Requests. nmap -PE 10.10.10.0/24
--packet-trace Shows detailed packet sending/receiving logs. nmap --packet-trace 10.10.10.0/24
--reason Displays the reason for a result. nmap --reason 10.10.10.0/24
--disable-arp-ping Disables ARP Ping. nmap --disable-arp-ping 10.10.10.0/24
--top-ports=<num> Scans the most common ports. nmap --top-ports=100 10.10.10.0/24
-p- Scans all ports. nmap -p- 10.10.10.0/24
-p22-110 Scans ports between 22 and 110. nmap -p22-110 10.10.10.0/24
-p22,25 Scans only ports 22 and 25. nmap -p22,25 10.10.10.0/24
-F Scans top 100 most common ports. nmap -F 10.10.10.0/24
-sS Performs a TCP SYN scan. nmap -sS 10.10.10.0/24
-sA Conducts a TCP ACK scan. nmap -sA 10.10.10.0/24
-sU Runs a UDP scan. nmap -sU 10.10.10.0/24
-sV Scans service versions. nmap -sV 10.10.10.0/24
-sC Uses default scripts for scanning. nmap -sC 10.10.10.0/24
--script <script> Runs specified scripts during the scan. nmap --script http-title 10.10.10.0/24
-O Identifies the target’s operating system. nmap -O 10.10.10.0/24
-A OS, service, and traceroute detection. nmap -A 10.10.10.0/24
-D RND:5 Uses 5 random decoys for the scan. nmap -D RND:5 10.10.10.0/24
-e Specifies the network interface for scanning. nmap -e eth0 10.10.10.0/24
-S 10.10.10.200 Sets the source IP address. nmap -S 10.10.10.200 10.10.10.0/24
-g Specifies the source port. nmap -g 80 10.10.10.0/24
--dns-server <ns> Uses a custom DNS server for resolution. nmap --dns-server 8.8.8.8 10.10.10.0/24

Output Options

Read more

  1. How to CTF


What is CTF?

CTF, or Capture The Flag, is a type of cybersecurity competition where participants solve challenges to find “flags” (specific pieces of text) hidden within systems, files, or code. These challenges test skills in areas like cryptography, web security, reverse engineering, forensics, and more. CTFs are popular in the cybersecurity community and are used for learning, practice, and fun.

Types of CTFs

  1. Jeopardy-Style

    • Participants solve challenges organized into categories (e.g., cryptography, forensics, etc.).
    • Each solved challenge reveals a flag, earning points.
    • Examples: Decoding encrypted messages, analyzing memory dumps, or identifying vulnerabilities.
  2. Attack-Defense

Read more

  1. Exploring the Linux File System: A Beginner’s Guide


When you first jump into Linux, one of the first things you’ll encounter is its file system. Unlike Windows, which uses drive letters like C:, Linux organizes everything under a single root directory (/). This organization might seem a bit daunting at first, but understanding it is key to navigating your system, troubleshooting problems, and managing files effectively. So, let’s break down the Linux file system hierarchy in a more approachable, human way, so you can start using it like a pro.

Read more

  1. Setting up hacking Environment…


Setting Up Your Hacking Environment: A Beginner’s Guide

If you’re curious about ethical hacking or just starting your journey into cybersecurity, the first step is creating a safe and functional environment for your experiments and learning. This guide will walk you through the process in a detailed and technical format, making it easy to understand—even for beginners (yes, you!).


1. Start with the Right Hardware

Before you get your hacker on, make sure your computer can handle the demands of hacking tools and virtual machines. A good hacking environment requires hardware that can support multiple virtual machines, networks, and complex tools. Here’s a more technical breakdown:

Read more

  1. cyber attack commands (Network Attacks)


note: its my personal research so there can be errors or more fast and powerful method available to do same attacks


packet sniffing : airodump-ng [monitor mode interface]

first enable monitor mode; then..

  • ifconfig wlan0 down

  • airmon-ng check kill ( to kill the manager)

  • iwconfig wlan0 mode monitor

  • ifconfig wlan0 up

  • iwconfig ( to check)


network preconnection attack.txt

note: need monitor mode on

  • airodump-ng wlan0 ( discover all wireless network and info around it)

sniff and discover 5Ghz networks

Read more

  1. Really useful AI & CEH tools


AI Tools for Creativity and Productivity

Text to Image:

  • Mind Journey: A tool that uses AI to transform textual descriptions into detailed, creative images. Ideal for visualizing abstract concepts or creative ideas.

Text to Music:

  • ChatGPT: An AI language model that can generate lyrics, suggest melodies, or help with music composition based on text input.
  • Uberduck AI: Specializes in converting text into music or vocal synthesis, offering various styles and voices.
  • Suno AI: A tool for generating music compositions from text prompts, helping artists create background scores or thematic music.

Text to Presentation:

Read more

  1. cybersec tips & tricks


Cybersecurity Tips and Tools for Beginners: Hackers Hate These Simple Tricks

So, you’ve stumbled into the world of cybersecurity, huh? Good choice! Whether you’re here to keep your personal data safe or dreaming of becoming the internet’s Batman, you’re in the right place. This blog is your crash course—no fluff, just actionable tips and beginner-friendly tools. Let’s jump in!


Step 1: Know Your Enemies (Yes, There Are Many)

Cyber threats come in all shapes and sizes, from sneaky scammers to sophisticated hacking groups. Here are the main culprits you’ll face:

Read more

  1. My Awesome First Blog CI/CD Pipeline


Image Description

Welcome to My Blog!

Hello there, and welcome to my corner of the internet!

Whether you stumbled in during a late-night browsing session or deliberately tracked this blog down (major kudos to you for that), I’m thrilled you’re here. This is a space where curiosity meets creativity—a digital lab, journal, and playground all in one.


What’s This Blog About?

At its heart, this blog is about exploration—of ideas, technologies, hobbies, and everything in between. I’ll be sharing insights from my personal and professional journey, diving deep into the topics that light me up and (hopefully) inspire you too.

Read more