Blog
Here, you can find news about our professional projects and other things that I (Daniel) like or interest me personally.
TryHackMe – Active Directory Basics Write Up
A short write-up of the Active Directory Basics Room on TryHackMe.
Book Review: How to Take Smart Notes by Sönke Ahrens
An introduction to the Zettelkasten-method Hello friend, I hope you enjoy my review of How to Take Smart Notes by Sönke Ahrens and the concepts behind it. What is it about? This book is about note-taking and writing with the Zettelkasten-Method, which was originally introduced by Niklas Luhman. Luhman was a highly productive german sociologist who published more than 70
Notion – my favorite note-taking app and how I use it for university
Hello friend. I have been using Evernote for years. It was the place where I put a lot of things that interested me, but then I never looked at them again. There was no real structure I enjoyed working with. And I still use it for that, like a filing cabinet for documents I might need later. But
TryHackMe – Upload Vulnerabilities Write Up
Hello friend. This room is all about upload vulnerabilities, who would have thought? Firstly, follow the instructions of the room to set up your environment. Task 4 – Overwriting Existing Files What is the name of the image file which can be overwritten? If we inspect the source, we can see there is only one image: mountains.jpg Overwrite the image.
TryHackMe – John The Ripper Write Up
Hello friend. A room all about the password cracking tool john the ripper. I like it. Task 2 – Setting up John the Ripper What is the most popular extended version of John the Ripper? jumbo john Task 3 – Word Lists What website was the rockyou.txt wordlist created from a breach on? rockyou.com Task 4- Cracking Basic Hashes Download
TryHackMe – Hashing Crypto 101 Write Up
Hello friend. This room is a nice introduction to hashing and how cryptography works. Task 1 – Key Terms Is base64 encryption or encoding? encoding Task 2 – What is a hash function? What is the output size in bytes of the MD5 hash function? 16 Can you avoid hash collisions? nay If you have an 8 bit