Introduction
Today we are going to crack a vulnerable Web Challenge. It was created by CloudSEK and its team. This is a Capture the Flag type of challenge. It contains one flag that is accessible after decoding a flag image that we get while our challenge and even form link is also a type of flag capture which is further accessible by decoding the image that we got during flag capturing. It was an Intermediate level Challenge. It made me think and work on it a few times. It is an example that enumeration and harder thinking is key to…


Buffer

Buffer is a region of memory used to temporarily hold data while it is being moved from one place to another. A buffer is used when moving data between processes within a computer. Majority of buffers are implemented in software. Buffers are generally used when there is a difference between the rate at which data is received and the rate at which it can be processed.

In this small program we defined a buffer in form of char of length 5 and its layout in stack in shown in right.

Buffer Overflow

A buffer overflow occurs when more data is written to…


Malware is a program designed to gain access to computer systems for the benefit of some third party, without the user’s permission. Malware includes computer viruses, worms, Trojan horses, ransomware, spyware and other malicious programs.

While most of us have heard of computer viruses but most of us haven’t heard of the other kinds of threats that exists on the World Wild West Web. So, for the sake of everyone’s knowledge let’s study that! we will see nine terms and their most simple definitions.

1. Malware (Malicious Software)

Malware is the umbrella term used to define any kind of intrusive software. Common examples of…


Passwords — Do

  • use hard-to-guess passwords or passphrases. A password should have a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters. To make it easy for you to remember but hard for an attacker to guess. For example, pick a phrase that is meaningful to you, such as “My birthday is 8 October, 1999 and my name is Pratham Mittal.” Using this phrase as your guide, you might use PrMi08@Oct19 for your password.
  • use different passwords for different accounts. If one of the password gets hacked, your other accounts should not be compromised.

Passwords —…


Ransomware is as malicious software (malware) that hijacks users’ information, threatening to either display it publicly or block access unless the user(s) pay a ransom. Over the last few years, as the methods used to lock user data has become more sophisticated, ransomware has gone from an occasional nuisance that affects a handful of private users to a genuine threat. The latest culprits — WannaCry, and Petya — will be discussed below, as we show how you can protect yourself against these threats.

Petya was discovered in 2016, making it the oldest of the programs discussed in this article. It…


Curl also known as Client Universal Resource Locator, is a command line tool that is used to check connectivity to URL and transfer data (it can also transfer multiple files) to/from web servers using protocols that are mandatory to mention while using curl, it supports protocols such as (HTTP, HTTPS, FTP, TELNET, LDAP, DICT etc.). It can be used in CMD (Windows) or Terminal (Linux) etc. for automation without any interaction of user. It is developed by a Swedish programmer named Daniel Stenberg. Curl uses free and IPV6 compatible library known as libcurl for its working.

One of the greatest…


How to use curl and see its variants practically using screenshots

Curl also known as Client Universal Resource Locator, is a command line tool that is used to check connectivity to URL and transfer data (it can also transfer multiple files) to/from web servers using protocols that are mandatory to mention while using curl, it supports protocols such as (HTTP, HTTPS, FTP, TELNET, LDAP, DICT etc.). It can be used in CMD (Windows) or Terminal (Linux) etc. for automation without any interaction of user. It is developed by a Swedish programmer named Daniel Stenberg. Curl uses free and IPV6 compatible library known as libcurl for its working.

One of the greatest…

Pratham Mittal

Loves Ethical hacking and cybersecurity

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store