-
Ethernaut CTF Part-1!
Ethernaut CTF Part-1 Introduction I’ve started doing work arounds on blockchain, as a part of it I started solving Ethernaut CTF, as this is long making this into parts. TLDR; 0.Hello Vulnerability Concept: No actual vulnerability — this level is for setup, interaction, and basic Solidity understanding. It’s about exploring and unde... Read More
-
Netwrok Devices 🛜
Caution : Too many gifs ahead. XD Introduction I've always been fond of networking devices, imagining them and flow of data around me through those deivces. I'm bad at forming analogies but here I'm trying to make another one 😅. Networking is like having your own Avengers team, where each device plays a special role to keep everything... Read More
-
OverTheWire Bandit Walkthrough 🐈
🎉 Happy New Year (2025)! 🎉 May this year bring you success, joy, and countless adventures in your learning journey! Introduction Ready to dive into the OverTheWire Bandit CTF series? 🕵️♂️ This walkthrough is a guide. Whether you’re a beginner or looking to brush up your basics, the Bandit series is perfect for honing your Linux comman... Read More
-
Overview of ISC2 Certified in Cybersecurity 🪪
Motivation “Life is a marathon, not a sprint” Phillip C. McGraw Welcome Back Hola gente..! Disclaimer: This blog only discusses my POV on ISC2 CC. Introduction This post provides an overview of Certified in Cybersecurity (CC), offered by ISC2, a non-profit organization specializing in training and certifications for cybersecurity... Read More
-
Linux Foundations Part 1 🐧
Motivation “In real open source, you have the right to control your own destiny. - Linus Torvalds” The Story of Unix and Linux Unix: The Beginning In 1969, a team at Bell Labs wanted to make software that could work on all computers, so they created Unix. They made it in C language (instead of assembly language), which made the code si... Read More