Category: Tutorial
-

NexHunt CTF 2025
If you want to read the write up from one of my other writeups from a CTF please see this link. Blank Challenge The challenge category is reverse and is worth 100 points. The snippet below shows information about the file. I used the file command to get this information. It shows that the file…
-

HeroCTF v7 2025
Please check out my other write up for a CTF named GlacierCTF. Tomcat Challenge The image above shows the file tree of the files that was given to us for this challenge. When visiting the site for this challenge, the page showed the default page for TomCat . I clicked one of the buttons to…
-

Taking a Look at Ruby Gems
Origin Story. I decided to take some of my projects and publish the gems on Rubygems with my awesome username of Banksy. For those who do not know, gems are like Python’s packages. They make it easy to run code. To access the gem, simply add’ require “gem_name” ‘ to the top of the file,…
-

GlacierCTF 2025 Challenge
Please check out my other posted related to CTF, the name of the article is UTCFT 2025 CTF Challenge Write-Up. The GlacierCTF was hosted by ISEC Institute @ TU Graz aka LosFuzzys. They did a great job hosting this CTF, there was no issues with the CTF. None of the challenges went down during the…
-

Danger of A.I
If you have not already, please check out last week’s article about “The dangers of downloading files“. Recently A. It has become popular and accessible to everyday folks. Before, you had to have a deep understanding of math and know how to program. And even have a large amount of commuting power. With Chat GPT,…
-

How to Safely Download Files
Check out this article about how to safety limit information about your kids on social media. Introduction Downloading files is necessary for tasks to be completed while on the computer. However, it is also the most dangerous, as it often opens the door for unknown software to access your computer. Your computer is not only…
-

My first Trip to DefCon
Intro I want to start this out that one of the items on my bucket list was to go to Defcon. While at Defcon the first day, we also went to Pawn Stars Pawn shop where I purchased a nice round. Sadly Chamblee’s candy store was closed. Also I guess it is common in Las…
-

Using PowerShell: At Work.
Please check out my other post about PowerShell, which is titled “PowerShell Script to generate queries“. I had another post that showed the script, which could look up a domain’s IP and create a query for a specific product I use at my job. My boss gave us another script that we can use to…
-
Add Comment Column on Wireshark.
Please check out this other post of mine titled “Using Dorks for learning and for fun.“. It shows you how to use Dorks to find better information on the internet. Adding column to Wireshark. In this tutorial, I will explain how to add a new column to Wireshark that displays comments. I have found this…

