top of page
Search
Ramesh Amgai
4 min read
OverTheWire Bandit Level 11-21: Walkthrough
Bandit Level 11 → Level 12 Level Goal The password for the next level is stored in the file data.txt, where all lowercase (a-z) and...
Ramesh Amgai
3 min read
OverTheWire Bandit Level 0-10: Walkthrough
Bandit Level 0 Level Goal The goal of this level is for you to log into the game using SSH. The host to which you need to connect is...
Ramesh Amgai
5 min read
Top Commands for Linux Beginners
We will not cover much theory. Instead, we simply provide top commands and their use. 1. Expand and Unexpanded Command expand demo.txt...
Ramesh Amgai
2 min read
Intercepting Sessions Through Man in The Middle Attack (MiTM)
MiTM is an eavesdropping attack carried about by establishing a relay or proxy into a communication session. It may exploit in real-time...
Ramesh Amgai
4 min read
CIA Triad of CyberSecurity
The keyword “CIA” used here does not signify well known US intelligence agency, instead, it is comprised of different letters with...
bottom of page