Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with other members of similar interests. It contains several challenges that are constantly updated. Some of them simulating real world scenarios and some of them leaning more towards a CTF style of challenge.
Let’s say you were interviewing a butterfly or a Mayfly. A Mayfly lives for four or five days. Say that Mayfly was standing on the branch of a giant Sequoia tree in California, which lives for thousands of years. If you were to ask that Mayfly, “Do you perceive this branch that you are standing on as being alive?” The Mayfly would say, “Of course not. I’ve been here my entire life, four days, and the branch hasn’t done a single thing.”
A small (and constantly updated) list of infosec, security, privacy-related Twitter accounts.
If you try to flash Tizen OS (any version) on a new Ubuntu or Debian installation, you will notice
lthor no longer plays nice with the Linux kernel, and it will fail without any messages. It has something to do with this.
The problem is
/dev/ttyACM0 is no longer detected, if you do a
ttyACM0 is not there even if the device is connected.
Do not play with the samples unless you really know what you’re doing. You have been warned!
The ransom is between $300 to $600, there is code to delete files in the virus so it’s not just a threat.
Below are some useful Linux commands for penetration testing, target reconaissance and capability assessment. Use them for good, not for evil.
user@host:~$ traceroute <target> user@host:~$ traceroute google.com traceroute to google.com (22.214.171.124), 24 hops max, 52 byte packets 1 192-168-1-110.x.com (192.168.1.110) 9.403 ms 7.301 ms 3.264 ms 2 10.10.10.10 (10.10.10.10) 47.823 ms 3.649 ms 2.436 ms ... etc ...
Keep in mind that adding  converts the expression to a String, for example: