Joshua Cole
Joshua Cole's Blog

Joshua Cole's Blog

Follow
homeCyber Security 101How things workBeginnersQuest - Google CTF 2021badgesnewsletter
Tag

Tutorial

#tutorial

More content

Read more stories on Hashnode


Articles with this tag

Making a $2 BadUSB (USB Rubber Ducky)

Sep 17, 20223 min read

What is a BadUSB? A BadUSB is a USB device that acts as a keyboard and injects preprogrammed keystrokes into a computer. A BadUSB is Indistinguishable...

Making a $2 BadUSB (USB Rubber Ducky)

Hunt down social media accounts with Sherlock

Jul 12, 20225 min read

Sherlock is a powerful command line tool that can be used to find usernames across many websites and social networks. It works on Linux, MacOS and...

Hunt down social media accounts with Sherlock

4. Secret Location - Base: Beginners Quest Google CTF Writeup

Jun 22, 20225 min read

Prerequisites: If you do not have the below knowledge, you will not understand the solution. You need a good understanding of binary. You need to...

4. Secret Location - Base: Beginners Quest Google CTF Writeup

Google's Beginners Quest CTF writeup of questions 1 & 2

Jun 17, 20224 min read

This is a write-up to Google's Beginners Quest CTF for questions 1 & 2. Challenge 1 When we first go to the webpage we are greeted with a login...

Google's Beginners Quest CTF writeup of questions 1 & 2

How to brute force online login credentials with Hydra

Jun 16, 20225 min read

Hyrda is a beloved tool for penetration testers to brute-force online passwords. Hydra is featured filled, open-source and supports any protocol you...

How to brute force online login credentials with Hydra

How to implement and verify checksums on Linux

Jun 15, 20223 min read

What are checksums and why do you need them? Checksums are critically important if you want to make sure the data you have downloaded hasn't been...

How to implement and verify checksums on Linux