Understanding AES-Part 2

Hello Peeps, Sorry for such a late post. But now in this post, I will deep dive into the internals and the structure of the AES Algorithm. Since we have discussed with the basic definition of AES, we will get into details this time. As we know, AES is the most important symmetric key algorithm […]

Giddy – HACK THE BOX

Hello Hackers!!! In this blog post, we gonna solve the CTF Challenge GIDDY presented by Hack the box. GIDDY is a very interesting and tricky Challenge and its ratings seem good and also the level of difficulty is 7/8 out of 10. Index About Box Enumeration Port Scanning Enumeration on port 80 (HTTP Service) Directory […]

DAB – HACK THE BOX

Hello, Hackers !! In this blog post, we gonna solve the CTF Challenge DAB presented by Hack the box. DAB is a very interesting Challenge and its ratings seem good and also the level of difficulty is 7/8 out of 10. Index About Box Enumeration Port Scanning Enumeration on port 80 (HTTP Service) Brute Forcing […]

Subdomain Takeover Explained with Practical

Hello All, After a long time. Finally, I manage my time to write detailed things about one very famous attack. which is “Subdomain Takeover” attack. Nowadays this vulnerability goes wild just because of bug hunters. I just try to write the “Subdomain Takeover” attack detailed with an in-depth explanation for my readers. After reading this […]

HTTP Security Headers Detailed Explanation

Hello All, I have been working as a software developer over 2 years on different technologies such as PHP, javascript, HTML, Python, nodeJS, ShellScript etc. So, Web Application Security is one of my interested fields. The reason for writing this post is, as a developer, we always focus on complete the functionality of the project. […]

Understanding AES – Part 1

Hello Peeps, AES is an algorithm widely used for different applications. It is an encryption algorithm and not used for creating hashes that means you can decrypt a data using the algorithm which is not possible in case of hashes. 🙂 AES is a symmetric key algorithm which means that it uses only one key […]

Introduction to Fields

Hello Folks, I hope my last post was useful to you all and you could understand at least the definition that I had mentioned. Basically, it is not that easy to understand group theory at once, but I can assure you that once you are able to understand their application in Cryptography, you might start […]

Introduction to Rings

Hey All, This is the continuation of my previous post where I had discussed about Finite Groups. It is relevant to everyone who is willing to know about how algorithms are made and what makes them work so well in our real life. So, here we will be learning about rings but before that, let […]

Introduction to Finite Groups

Hello Folks, This is my first post on a topic which is of my area of interest, “CRYPTOGRAPHY”. Being from a mathematics background, it always helped me in understanding the basic concepts used behind the widely used algorithms. So, here I will be sharing some knowledge about cryptography basics and the actual mathematics behind it. […]

Reversing simple program

Hi there, In this blog i am going to explain how we can crack or reverse a simple password checker program. This blog is also for beginners who are new in reverse engineering. Here we can see that when we exec this binary it ask for a argument called password. Our mission is to find password. Wrong […]