Posts

Showing posts from January, 2019
Image

Kalu Linux - Install Kalu Linux

Image

Kalu Linux - Nettacker vulnerability scanner

Image

Steganography

Image
VetSec Takes First in the Hacktober CTF: Summary & Steganography Write-up! For the last week, VetSec competed in the Hacktober.org CTF event, which consisted of challenges in forensics, steganography, programming, offensive tactics, web application, reverse engineering, cryptography, and more.  I am happy to announce that WE WON!
Our team consisted of the following members:
Elliot Chernofsky (@emtuls)Reuben Booker (@reubadoob)Rob Fuller (@mubix)Myself (@hmaverickadams) The competition itself was close up until the very end.  We competed against well over 100 teams and the challenges ranged from pretty beginner stuff through some down right clever hidden flags.  Shout out to Midwest Cyber Center for putting on the event and to the mods (@overallcoma1 & @attackd0gz) for staying on top of everything.  They were the true MVPs. In spirit of the win, I wanted to write up the entire Steganography section, which is my favorite CTF category.  Other write-ups are in the works …

Vulnerability Lab Setup

x86 Exploit Development Pt 1 – Intro to Computer Organization and x86 Instruction Set Architecture Fundamentals Hey guys! I figured that it would be beneficial to have an entire post dedicated to teaching some fundamentals about Computer Organization and the x86 Instruction Set Architecture, since I will be referencing this particular ISA (instruction set architecture) throughout most of my tutorials on Exploit Development and Reverse Engineering. This will be updated over time as I find more information that might be useful for someone to know when working on these topics! Computer Organization Basics – Memory: It would be valuable to know how memory works and the organization of it, such as bits and bytes, and concepts like little endian and big endian. In our case, x86 uses little endian format. What this means is that our information is stored in virtual memory addresses in reverse order (little end first). Reference:this website for more information, or Chapter 1 in this book. …

How To Access Notorious Dark Web Anonymously (10 Step Guide)

Image
Are you trying to find outhow to access the dark weband what is it? Well, look no further, we have gone and done the research so we could show you step by step the best and safest way how to access the dark net. We cover everything, from setting up Tor, how to choose a VPN, what not to do, finding the best sites to access, and extra steps to remain anonymous. It is extremely easy to access the dark web and even easier to be detected on it if you don’t take precautions. If you are new to the darknet, this guide will help you on your way. According to researchers, only 4% of the internet is visible to the general public. Meaning that the remaining 96% of the internet is made up of “The Deep Web”. Dark Web or Dark Netis a subset of theDeep Webwhere there are sites that sell drugs, hacking software, counterfeit money and more. We explain this further down the article if you are not up to speed. If you are looking to access hidden marketplace’s or darknet websites (with a .onion domain) th…