Not only Passwords, You can also crack
✅NTLM hashes
✅/etc/shadow files
✅Password protected Zip files
✅Password protected RAR Archives
✅SSH keys
With John The Ripper
A 🧵
So, If any one asks you "How to get started in this field" don't just suggest them to do THM rooms, share this checklist with them, so that they can learn topic wise.
I will be updating this with new released rooms.
Chetan Bhagat is progressively declining:
5 point someone
3 mistakes of my life
2 states
1 night in a call center
1/2 girlfriend
what next?
A ‘quarter’ of whisky?
HR : What are your Strengths ?
Candidate : I am very good with Exploit Development, AD, Reverse Engineering, Malware analysis and recently my CVE-2022-69696 also got published.
HR : That's really great,And what are your weaknesses ?
Candidate : I am a liar.
we r way better than offsec so we follow their path lmao
tcm can put one hour before or after but nah
Grab your popcorn guys,
#infosec
twitch rivals gonna start next wednesday lol
Ethically Hacked and Reported a Security Flaw.
Vulnerability - Site wide CSRF
Tips - Recon is everything, test each and every parameter for Injection vulnerabilities and CSRF.
And, CSRF IS NOT DEAD, WE JUST NEED TO LEARN MORE BYPASSING TECHNIQUES. Like chaining with XSS
#Hacked
@Bugcrowd
*Goes outside for washroom, and they found a pendrive.
Pentester : It might be a Rubber Ducky.
Hardware Pentester : No, it might be a USB kill.
Web Pentester : No, it is not in the bar, so it must be out of scope.