CTF Challenges Hacking Security

Droopy v0.2 VM Walkthorugh

Hi Friends, Today I am going to start Capture the Flag Series. The Vulnerable Machine I am starting with is Droopy v0.2, that is available in vulnhub Here. I will start with discovering the IP of vulnerable machine, using netdiscover Information Gathering: netdiscover -r I founded that VM is running on IP Port […]

Security Tutorials

WMIC Tutorial

Today we will be discussing about how to check weather your computer is infected or not using manual methods, its not an foolproof method but I can find all non-sophisticated attacks by performing the below mentioned checks. i will be doing all these checks using Windows based command line tool called WMIC(Windows Management Instrumentation Command-Line). […]

Commands ICMP Networking ping

PING – Network Tool Tutorial – 2

OUTPUT ANALYSIS:In previous tutorial PING – Network Tool Tutorial – 1 we seen how PING Command works if you want to clearly understand about PING command go through Tutorial – 1. we catched echo_request and echo_response by using wireshark(A Popular Network Sniffing Tool) ping gives us three major information -Host Reachability-Network Congestion-Time To Live Host […]