Category: hacking

  • Using Dorks for learning and for fun.

    Google dorks do not only have to be used to find vulnerabilities or misconfigurations. Dorks can be used in your everyday searching. In this blog post I will show you dorks that can be used for everyday searching and dorks that can be used by hackers. Here are some examples of Dorks that I found…

  • UTCFT 2025 Challenge: March 14th

    Big thanks to Texas University ISSS for creating and moderating the game and the Discord chat. It was tons of fun and I learned a few new skills. Trapped in Plain Sight 1 I first SSH into the machine. The name of the challenge was “Trapped in plain Sight” so I figured the flag it…

  • Snyk CTF Challenge: Feb 28th 2025.

    String Me Along This was the first reverse engineering challenge. It was labeled easy. The first thing I did was use the strings command to view all the strings in the binary. The string command will print all the printable characters that are in the file. Next I tired to enter, “unlock_me_123” after running the…

  • Comment Column on Wireshark.

    In this tutorial, I will explain how to add a new column to Wireshark that displays comments. I have found this to be helpful at work when looking at a packet capture that has a lot of IPs, and I need to determine information about them in a quick manner. The first step is to…

  • SnackHack2: Hacking tool and Recon

    This tool comes in gem form and can also be downloaded from Github.com. Originally, this project would be my senior project, but I had to scrape the idea for a simpler project due to my course workload and mental health. To install the gem run the command below. gem install snackhack2 Indirect Command Injection This…