Posts for: #Tips

  1. How to CTF


What it CTF?

CTF, or Capture The Flag, is a type of cybersecurity competition where participants solve challenges to find “flags” (specific pieces of text) hidden within systems, files, or code. These challenges test skills in areas like cryptography, web security, reverse engineering, forensics, and more. CTFs are popular in the cybersecurity community and are used for learning, practice, and fun.

Types of CTFs

  1. Jeopardy-Style

    • Participants solve challenges organized into categories (e.g., cryptography, forensics, etc.).
    • Each solved challenge reveals a flag, earning points.
    • Examples: Decoding encrypted messages, analyzing memory dumps, or identifying vulnerabilities.
  2. Attack-Defense

Read more

  1. How to CTF


What it CTF?

CTF, or Capture The Flag, is a type of cybersecurity competition where participants solve challenges to find “flags” (specific pieces of text) hidden within systems, files, or code. These challenges test skills in areas like cryptography, web security, reverse engineering, forensics, and more. CTFs are popular in the cybersecurity community and are used for learning, practice, and fun.

Types of CTFs

  1. Jeopardy-Style

    • Participants solve challenges organized into categories (e.g., cryptography, forensics, etc.).
    • Each solved challenge reveals a flag, earning points.
    • Examples: Decoding encrypted messages, analyzing memory dumps, or identifying vulnerabilities.
  2. Attack-Defense

Read more

  1. Kali, linux Commands


Linux Commands Cheat Sheet

1. File and Directory Management

  • ls
    List files and directories.
    Example:

    ls
    
  • ls -l
    List files with detailed information.
    Example:

    ls -l
    
  • mkdir
    Create a new directory.
    Example:

    mkdir new_folder
    
  • rmdir
    Remove an empty directory.
    Example:

    rmdir empty_folder
    
  • rm
    Delete files or directories.
    Example:

    rm file.txt
    
  • cp
    Copy files or directories.
    Example:

    cp source.txt destination.txt
    
  • mv
    Move or rename files.
    Example:

Read more

  1. cyber attack commands


note: its my personal research so there can be errors or more fast and powerful method available to do same attacks


Commands Related to Network Attacks:

packet sniffing : airodump-ng [monitor mode interface]

first enable monitor mode; then

  • ifconfig wlan0 down

  • airmon-ng check kill ( to kill the manager)

  • iwconfig wlan0 mode monitor

  • ifconfig wlan0 up

  • iwconfig ( to check)


network preconnection attack.txt

note: need monitor mode on

  • airodump-ng wlan0 ( discover all wireless network and info around it)

sniff and discover 5Ghz networks

Read more

  1. The Ultimate Guide to Elemental Reactions in Genshin Impact


Introduction: Understanding the Power of Elemental Reactions

Mastering elemental reactions is essential for any Genshin Impact player looking to maximize their damage potential. These reactions not only add depth to gameplay but also allow for creative team compositions that can handle even the toughest foes. In this guide, we’ll cover every elemental reaction, explain how to trigger them effectively, provide the formulas for their damage increases, and share insights on the best team combinations.

Read more

  1. cybersec tips & tricks


Cybersecurity Tips and Tools for Beginners: Hackers Hate These Simple Tricks

So, you’ve stumbled into the world of cybersecurity, huh? Good choice! Whether you’re here to keep your personal data safe or dreaming of becoming the internet’s Batman, you’re in the right place. This blog is your crash course—no fluff, just actionable tips and beginner-friendly tools. Let’s jump in!


Step 1: Know Your Enemies (Yes, There Are Many)

Cyber threats come in all shapes and sizes, from sneaky scammers to sophisticated hacking groups. Here are the main culprits you’ll face:

Read more