Category: hacking

  • Using Dorks for learning and for fun.

    Google dorks do not only have to be used to find vulnerabilities or misconfigurations. Dorks can be used in your everyday searching. In this blog post I will show you dorks that can be used for everyday searching and dorks that can be used by hackers. Here are some examples of Dorks that I found…

  • UTCFT 2025 Challenge: March 14th

    If you are interested reading CTF challenges please check out my other article named Snyk CTF Challenge: Feb 28th 2025 where I talk about other CTF I have participated in. Big thanks to Texas University ISSS for creating and moderating the game and the Discord chat. It was tons of fun and I learned a…

  • Snyk CTF Challenge: Feb 28th 2025.

    Please check out my other posts about other CTF’s I have participated on such as UTCFT 2025 Challenge: March 14th This was the first reverse engineering challenge. It was labeled easy. The first thing I did was use the strings command to view all the strings in the binary. The string command will print all…

  • Comment Column on Wireshark.

    Adding column to Wireshark. In this tutorial, I will explain how to add a new column to Wireshark that displays comments. I have found this to be helpful at work when looking at a packet capture that has a lot of IPs, and I need to determine information about them in a quick manner. The…

  • SnackHack2: Hacking tool and Recon

    SnackHack2: Hacking tool and Recon

    This tool comes in gem form and can also be downloaded from Github.com. Originally, this project would be my senior project, but I had to scrape the idea for a simpler project due to my course workload and mental health. Please check out my other article about this tool, the article name is SnackHack2: Scripts…