Sign in

Each day thousands of accounts are compromised by hackers and bots crawling all over the internet. This has many obvious repercussions for the owners of these accounts as they could: lose access to their data, be victim to identity fraud, could lose their finances, have their data sold on the dark web etc.

This happens a lot since many of us prefer convenience over security. Companies also do quite a bad job at teaching their users about security basics. …

The internets full of a ton of files which makes it quite hard to determine what you’re downloading is actually the thing that you were looking for. Fortunately, there are a few things you can do to ensure the intergrity of the file in question which we’ll explore in this blog post.

Using stores to download your desired software decreases the risk of encountering malicious versions of that program. Places like this are very rigorous when it comes to security especially the Apple App Store which makes it less likely that you’ll find malware on there (although there have been…

One thing that’s very popular is for people to call any sort of malicious program a “virus” when there’s much more to them than that. The name malware comes from the words malicious and software being mixed together thus creating malicious software. It comes in many different forms with each one being specialized for a certain task so lets explore them.

The first piece of malware on the list is the one that everyone refers to when something goes wrong. Viruses work pretty similarly to real life viruses in that they wreck havok and replicate themselves to achieve total chaos…

A very simple room with three task that have us reverse engineering some simple programs to finds passwords. To prepare, all we have to do is download the files and run the “chmod -x” command on each of them to give them execute permissions. Some might also need to run “sudo apt get radare2” to install the command line reverse engineering tool.

In this blog, we’ll be exploring the solutions to the questions in this room as well as learning how we can utilize the Owasp top 10 web vulnerabilities to perform our “malicious” actions. This one’s gonna be quite long so lets get on with it my fellow hackers.

  1. Command Injection

The first room we explore is command injection. Here we only have an input field with very little information whenever anything is typed into the field. It is however enough for us to discover a lot of valuable information.

We start off by running ls to list everything in our…

With the latest advances in technology, developers have been able to release new content onto software really fast and often. It’s understandable that it can get annoying to keep downloading and applying these updates onto your devices however it’s for the better.

There’s upsides and downsides to these technological advances. The good sides are that you get more content and features, it gets pushed out to you faster and the updates are usually very easy to apply.

The downsides are that the larger the codebase the higher the room for errors and bugs is to appear, these bugs can easily…

People will always prefer convenience over security. This has a very negative impact as it very often leads to account takeovers since people just make it too easy for hackers to get in. Today I’ll show you how your passwords can be broken, what can be done to get around it and then how to create stronger ones instead.

Bruteforce attack performed with John the Ripper

When it’s time to break into your account, hackers will often try two methods; bruteforcing and dictionary attacks. Bruteforcing involves an attacker trying every combination of characters in hopes of hitting the right order. An example of this would be trying…

An introduction to reversing simple programs using the radare framework along with some assembly basics like the syntax (AT&T in this case), registers, if statements and loops. The room can be found here: .

This room starts off by getting you to connect to the server. Simply enter the terminal and type in tryhackme@<SERVER_IP>, accept the fingerprint and enter the password which is reismyfavl33t.

The web more often than not feels like a nice place where we can discover tons of information and have a fun time. However, it doesn’t take long to look in the wrong direction and see how evil certain parts can be. Today I’ll teach you some things that you can do to protect yourself when browsing the internet. As it often is with privacy and security, you’re going to be sacrificing certain things such as some features but this is for the greater good.

Some people might respond by saying that there is no reason to put time into…

We’ve all experienced our devices become painfully slow to the point we no longer want to use them. This can make for a very annoying experience however I am here to save you (or at least try to). I’ll run you through the list of things I do whenever I need to freshen up my computer.

To start off, it’s best to do this on a clean device meaning you should ideally factory reset before continuing onwards. …

Daniel Kasprzyk

Hi I’m Daniel, a hacker/game dev. Here you’ll find interesting tech information and anything alike :)

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store