Daniel Kasprzyk

Sign in

Everytime you take a photo, your device will store that in an image format for you to enjoy however this isn’t the only information that will be saved. Embedded into that file will also be a range of metadata which in the wrong hands can be used by others to extract specific data for their own purposes. In this blog post I will go in depth into what this metadata is, what it contains and how to remove it.

EXIF stands for exchangeable image file and is a format for metadata that is added onto every image that you take…

Link to room: https://tryhackme.com/room/reverselfiles

This room allows you to test your skills at reverse engineering ELF binaries giving you 8 fun challenges to solve in total. The setup is fairly simple as you just need a Linux machine, some reverse engineering tools of your choice and basic RE knowledge. You’ll also need to download and grant each binary execute permissions. I had a lot of fun solving these and I hope you do too :D


Each day thousands of accounts are compromised by hackers and bots crawling all over the internet. This has many obvious repercussions for the owners of these accounts as they could: lose access to their data, be victim to identity fraud, could lose their finances, have their data sold on the dark web etc.

This happens a lot since many of us prefer convenience over security. Companies also do quite a bad job at teaching their users about security basics. …

The internets full of a ton of files which makes it quite hard to determine what you’re downloading is actually the thing that you were looking for. Fortunately, there are a few things you can do to ensure the intergrity of the file in question which we’ll explore in this blog post.

Using stores to download your desired software decreases the risk of encountering malicious versions of that program. Places like this are very rigorous when it comes to security especially the Apple App Store which makes it less likely that you’ll find malware on there (although there have been…

One thing that’s very popular is for people to call any sort of malicious program a “virus” when there’s much more to them than that. The name malware comes from the words malicious and software being mixed together thus creating malicious software. It comes in many different forms with each one being specialized for a certain task so lets explore them.

The first piece of malware on the list is the one that everyone refers to when something goes wrong. Viruses work pretty similarly to real life viruses in that they wreck havok and replicate themselves to achieve total chaos…

A very simple room with three task that have us reverse engineering some simple programs to finds passwords. To prepare, all we have to do is download the files and run the “chmod -x” command on each of them to give them execute permissions. Some might also need to run “sudo apt get radare2” to install the command line reverse engineering tool.

In this blog, we’ll be exploring the solutions to the questions in this room as well as learning how we can utilize the Owasp top 10 web vulnerabilities to perform our “malicious” actions. This one’s gonna be quite long so lets get on with it my fellow hackers.

  1. Command Injection

The first room we explore is command injection. Here we only have an input field with very little information whenever anything is typed into the field. It is however enough for us to discover a lot of valuable information.

We start off by running ls to list everything in our…

With the latest advances in technology, developers have been able to release new content onto software really fast and often. It’s understandable that it can get annoying to keep downloading and applying these updates onto your devices however it’s for the better.

There’s upsides and downsides to these technological advances. The good sides are that you get more content and features, it gets pushed out to you faster and the updates are usually very easy to apply.

The downsides are that the larger the codebase the higher the room for errors and bugs is to appear, these bugs can easily…

People will always prefer convenience over security. This has a very negative impact as it very often leads to account takeovers since people just make it too easy for hackers to get in. Today I’ll show you how your passwords can be broken, what can be done to get around it and then how to create stronger ones instead.

When it’s time to break into your account, hackers will often try two methods; bruteforcing and dictionary attacks. Bruteforcing involves an attacker trying every combination of characters in hopes of hitting the right order. An example of this would be trying…

An introduction to reversing simple programs using the radare framework along with some assembly basics like the syntax (AT&T in this case), registers, if statements and loops. The room can be found here: https://tryhackme.com/room/introtox8664 .

This room starts off by getting you to connect to the server. Simply enter the terminal and type in tryhackme@<SERVER_IP>, accept the fingerprint and enter the password which is reismyfavl33t.

Daniel Kasprzyk

Hi I’m Daniooo and I love hacking. Here you’ll find interesting tech information and anything alike :) https://linktr.ee/Daniooo

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store