877.791.9571 |

About the Author:

Rohit Shaw is a Certified Ethical Hacker works as a Information Security Consultant. He has experience in pentesting, social engineering, password cracking and malware obfuscation. He is also involved with various organizations to help them in strengthening the security of their applications and infrastructure.

Sharkfest 2013: Part II

In the first part of our article we solved the first three challenges, so in this article we will continue with rest of the challenges.


TRACE FILE: challengeattack.pcapng



Sharkfest 2013

The sharkfest challenge was organized by Wireshark University. There are seven challenges related to the trace files analysis. In each challenge, there are some questions we have to answer […]


Flick Challenge

Here is another interesting challenge we are going to solve. The vulnerable machine name is Flick. As usual, we started the game by hosting the image in a virtual […]


Troll Challenge

Just found an interesting vulnerable machine named Troll. It sounds like the machine will troll the attacker. We booted up the machine in Virtual Box and fired an Nmap […]


SecOS Challenge

In this article, we are going to solve the SecOS challenge, an entry level boot2root challenge.

So we start the game from hosting the vulnerable VM on the virtual box. […]


SQL Truncation Attack

The SQL Truncation vulnerability is a very interesting flaw in the database. The successful exploitation of this issue leads to user account compromise, as it means an attacker can […]


Murdering Dexter

In this article we are going to solve a Bot challenge. The name of the bot is Dexter and the vulnerable VM which we are going to use is […]


Xerxes Challenge

In this article we are going to solve another challenge of Xerxes. Xerxes is historically known as a god king, but here Xerxes is a vulnerable machine and our […]


Drunk Admin Web Hacking Challenge

This challenge includes a web application generally designed for image hosting. The application has a few vulnerabilities. The challenge is to exploit the application’s vulnerability and find the hidden […]


Recycle Bin Forensics

An icon on the Windows desktop represents a directory in which deleted files are temporarily stored. This enables you to retrieve files that you may have accidentally deleted. From […]


Skype Forensics

Skype is an application that enables voice and video calls, instant messaging, file transfers, and screen sharing between users. Millions of people download and use Skype everyday for voice […]


Hack I-Bank Pro

In this article we are going to see some major vulnerabilities typical of a remote banking application. We found an interesting vulnerable machine created by PHDays team. We hosted […]


R00t This Box

Here’s a challenge, root this box. We found a vulnerable machine named Hackademic RTB1. The main challlenge is to root the box with admin privileges and capture the flag.

First, […]


Vulnerability Assessment with Nexpose

Nexpose is one of the leading vulnerability assessment tools. The Nexpose community edition is a free program and the other editions are paid ones. In this article, we will […]


Vulnerability Scanning with Metasploit: Part II

In the previous article, we learned how to perform a network vulnerability assessment by using the OpenVAS plug-in. In this continuation, we will see how to perform a web […]


Vulnerability Scanning With Metasploit Part I

Metasploit Framework, the Metasploit Project’s best-known creation, is a software platform for developing, testing, and executing exploits. It can be used to create security testing tools and exploit modules […]


The FBI TOR Exploit


The Tor network is an anonymizing network that allows people to browse the web and access other services without being traced. As part of this network, there is the […]


Windows 7 Exploitation


Microsoft Windows 7 is much more secure than Microsoft Windows XP. The Windows XP operating system has lots of OS vulnerabilities and the malware infection rate is also very […]


Analyzing Malicious PDFs


PDF files have become very common in everyday work. It’s hard to imagine business proposals without PDFs. The PDF format is used in almost all companies to share business […]


SIM Card Forensics: An Introduction

The SIM (subscriber identity module) is a fundamental component of cellular phones. It also known as an integrated circuit card (ICC), which is a microcontroller-based access module. It is […]