Birdh0useHashing and Salting a PasswordToday we’re going to add a hashing function to our code. The code for this activity is here…Oct 19, 2022Oct 19, 2022
Birdh0useProtection against a Poison NULL byte.Before we get started we’re going to look at something on Unicode based character sets that will shed some light on what exactly a Poison…Oct 18, 2022Oct 18, 2022
Birdh0useBuilding and Breaking PasswordsAs a Developer you might put in enforce various ways to authenticate a user’s in your application we will cover common things Developers…Oct 13, 2022Oct 13, 2022
Birdh0useIdentifying Vulnerabilities in an ApplicationIn our first activity we shall learn how to identify a flaw in an Application. We will look at a Password function validator and identify…Oct 11, 2022Oct 11, 2022
Birdh0useDiscovering Vulnerabilities in Your Software#CyberSecurity_Awareness_MonthOct 7, 2022Oct 7, 2022
Birdh0useMars U. CTF Writeup.marsu was a service that consisted of a Django web server which allowed users to create accounts, projects, and "pads" within these…Aug 9, 2020Aug 9, 2020
Birdh0useMSFVenom Cheat SheetYou should have a collection of scripts ready to go in different programming languages that can help you spawn reverse shell back to your…Jun 25, 2020Jun 25, 2020
Birdh0use(Secure Safe Mobile App) Walkthrough #Nahamcon CTFI really enjoyed exploiting this Mobile app from the just ended Nahamcon CTF Conference, it was a 3 day Security Conference. I hope you…Jun 14, 2020Jun 14, 2020
Birdh0useVulnversity (TryHackMe CTF Walkthrough)Today we will be doing Vulnversity, a boot2root machine from Try Hack Me. This box covers some basics of enumeration, exploiting the file…May 24, 20202May 24, 20202
Birdh0useCyber Incident Response ToolsBelkasoft Evidence Center — The toolkit will quickly extract digital evidence from multiple sources by analyzing hard drives, drive images…May 12, 2020May 12, 2020