Posts for: #Tips

  1. How to CTF


What is CTF?

CTF, or Capture The Flag, is a type of cybersecurity competition where participants solve challenges to find “flags” (specific pieces of text) hidden within systems, files, or code. These challenges test skills in areas like cryptography, web security, reverse engineering, forensics, and more. CTFs are popular in the cybersecurity community and are used for learning, practice, and fun.

Types of CTFs

  1. Jeopardy-Style

    • Participants solve challenges organized into categories (e.g., cryptography, forensics, etc.).
    • Each solved challenge reveals a flag, earning points.
    • Examples: Decoding encrypted messages, analyzing memory dumps, or identifying vulnerabilities.
  2. Attack-Defense

Read more

  1. How to CTF


What is CTF?

CTF, or Capture The Flag, is a type of cybersecurity competition where participants solve challenges to find “flags” (specific pieces of text) hidden within systems, files, or code. These challenges test skills in areas like cryptography, web security, reverse engineering, forensics, and more. CTFs are popular in the cybersecurity community and are used for learning, practice, and fun.

Types of CTFs

  1. Jeopardy-Style

    • Participants solve challenges organized into categories (e.g., cryptography, forensics, etc.).
    • Each solved challenge reveals a flag, earning points.
    • Examples: Decoding encrypted messages, analyzing memory dumps, or identifying vulnerabilities.
  2. Attack-Defense

Read more

  1. Kali, linux Commands


Top 60 Linux Commands Cheat Sheet in one line


A. File and Directory Management Commands

  • ssh: Secure Shell, used for secure remote access to a system.
  • ls: List directory contents.
  • pwd: Print the current working directory.
  • cd: Change directory to a different folder.
  • touch: Create an empty file or update the modified timestamp of an existing file.
  • echo: Print a message or the value of a variable.
  • nano: A simple text editor.
  • vim: A more advanced text editor with many features.
  • cat: Print the contents of a file to the console.
  • shred: Securely delete a file by overwriting its contents.
  • mkdir: Create a new directory.
  • cp: Copy a file from one location to another.
  • mv: Move a file from one location to another, or rename a file.
  • rm: Remove a file.
  • rmdir: Remove a directory if it is empty.
  • ln: Create a link to a file or directory.
  • head: Display the first lines of a file.
  • tail: Display the last lines of a file.
  • cmp: Compare two files byte by byte.
  • diff: Display the differences between two files.
  • sort: Sort the lines of a file.
  • find: Search for files in a directory hierarchy.
  • chmod: Change the permissions of a file or directory.
  • chown: Change the owner of a file or directory.

B. System Management Commands

Read more

  1. cyber attack commands (Network Attacks)


note: its my personal research so there can be errors or more fast and powerful method available to do same attacks


packet sniffing : airodump-ng [monitor mode interface]

first enable monitor mode; then..

  • ifconfig wlan0 down

  • airmon-ng check kill ( to kill the manager)

  • iwconfig wlan0 mode monitor

  • ifconfig wlan0 up

  • iwconfig ( to check)


network preconnection attack.txt

note: need monitor mode on

  • airodump-ng wlan0 ( discover all wireless network and info around it)

sniff and discover 5Ghz networks

Read more

  1. Really useful AI & CEH tools


AI Tools for Creativity and Productivity

Text to Image:

  • Mind Journey: A tool that uses AI to transform textual descriptions into detailed, creative images. Ideal for visualizing abstract concepts or creative ideas.

Text to Music:

  • ChatGPT: An AI language model that can generate lyrics, suggest melodies, or help with music composition based on text input.
  • Uberduck AI: Specializes in converting text into music or vocal synthesis, offering various styles and voices.
  • Suno AI: A tool for generating music compositions from text prompts, helping artists create background scores or thematic music.

Text to Presentation:

Read more