
TryHackMe - Light
URL: https://tryhackme.com/room/lightroom Title Rating Light Easy Overview So the creator asks us to try a database app. The application is running on port 1337. We can connect to it using nc 10.10.123.134 1337 You can use the username smokey in order to get started. Recon Nmap gives use 2 open ports: Open 10.10.123.134:22 SSH Open 10.10.123.134:1337 DB app As per the description, lets try to netcat the database at 1337:...

TryHackMe - Billing
URL: https://tryhackme.com/room/billing Title Rating BillingV2 Easy BillingV2 is a Easy rated box, where we not allowed to perform any bruteforcing. In recon, we do find a webserver and mysql. Initial Foothold is acquired via a Unauth RCE on the Apache application - MagnusBilling. Later we use the sudo privileges on fail2ban tool to inject command in its functionality which eventually gets us root. Recon We start with Nmap Scan which get us few open ports:...

TryHackMe - Basic Pentesting
Recon Nmap Scan # nmap 10.10.22.7 -sV [](<PORT STATE SERVICE REASON VERSION 22/tcp open ssh syn-ack ttl 60 OpenSSH 7.2p2 Ubuntu 4ubuntu2.4 (Ubuntu Linux; protocol 2.0) 80/tcp open http syn-ack ttl 60 Apache httpd 2.4.18 ((Ubuntu)) |_http-server-header: Apache/2.4.18 (Ubuntu) |_ Supported Methods: OPTIONS GET HEAD POST 139/tcp open netbios-ssn syn-ack ttl 60 Samba smbd 3.X - 4.X (workgroup: WORKGROUP) 445/tcp open netbios-ssn syn-ack ttl 60 Samba smbd 4.3.11-Ubuntu (workgroup: WORKGROUP) 8009/tcp open ajp13?...

The Invisible Progress
The Invisible Progress: Why Learning Feels Slow but Changes Everything We often judge our progress by visible milestones—lifting heavier weights, speaking a new language fluently, or mastering a technical skill. But what if the real progress is so gradual that we don’t even notice it happening? This is the paradox of learning: the more immersed you are in the process, the less you feel you are improving. It All Starts with a Wish Everything begins with a wish....

Human AI Hybrid Cyber Defence
AI is trained on human-created data, and even if it advances significantly in the tech space, it cannot create bulletproof systems for a few key reasons: 1. AI Inherits Human Limitations AI models are trained on existing human knowledge, which includes flawed designs, biases, and security gaps. If past systems had vulnerabilities, AI might unknowingly replicate or even amplify them. 2. Complexity & Unpredictability of Software Modern software is extremely complex, with countless dependencies, interactions, and edge cases....
How Can Path to Success Be Success
The Question How can the path to success be success? This thought struck me recently, and the answer unfolded in a way I hadn’t expected. Here’s my realization: When you’re working on something, there’s a natural tendency to feel happy when things go right. But think about it—that joy stems from the fact that, deep down, you already had the knowledge to succeed at that task. The moment something “works,” it’s not the act of doing that brings you success; it’s the process of knowing that led you there....
Difference Between SSH and GPG Keys
Difference Between SSH Key Pair and GPG Key Pair 1. SSH Key Pair Purpose: SSH (Secure Shell) key pairs are primarily used for secure authentication and encrypted communication with remote systems (e.g., logging into a server or transferring files securely). Components: Private Key: Stays on your local system; never shared. Public Key: Shared with the remote server. Protocol: Built on the SSH protocol. Common Algorithms: RSA, ECDSA, ED25519. Use Cases: Logging into remote servers without passwords....
Setup a Static IP Using NetworkManager
To set up a static IP for your Linux system using NetworkManager, follow these steps: 1. Identify Your Network Interface Run the following command to find the name of your active network interface: nmcli device Look for the interface in the “DEVICE” column that’s connected. 2. Edit the Connection Use the following command to modify your network connection: `nmcli connection edit <connection_name>` Replace <connection_name> with the name of your active connection (you can find this in the “CONNECTION” column from the nmcli device output)....
What Do All the File Types in C Mean
In C programming, different file types (.c, .o, .a, .so, etc.) serve specific purposes throughout the software development lifecycle. Here’s a breakdown of each: 1. .c Files Purpose: These are source code files written in the C programming language. Contents: Contain human-readable C code (functions, definitions, etc.). Usage: These files are compiled into object files (.o) by a compiler like gcc. Example: #include <stdio.h> void hello() { printf("Hello, World!\n"); } 2....
Two Ways to Get Dynamic Arrays in C
Code 1: Variable Length Array (VLA) int n; scanf("%d", &n); int arr[n]; Features: Array Allocation: The array is declared on the stack. Stack memory is limited in size, so VLAs are unsuitable for very large arrays. Automatic Deallocation: The array is automatically deallocated when it goes out of scope (at the end of the function). You don’t need to free the memory manually. Portability: VLAs are part of the C99 standard and optional in C11....