StackOverCTF – Walk Through – CyberTalents

Posted in General, Hacking, How Tos, Information Security, Tutorials, Walk Throughs, Write Ups on November 15th, 2022 by admin

This was one of the challenges in qualification round for Digital Pakistan Cyber Security Hackathon 2022.
Category: Web Security
Level: Hard
Points: 200

Read more »
Tags: , , , , , , , , , , , , , , , ,

GroovyMolly – Walk Through – echoCTF

Posted in Hacking, Information Security, Walk Throughs, Write Ups on January 26th, 2022 by admin

IP Address:
Description: You may be thinking that Groovy Molly is random but its not…
Extra Info: Try to make the server spill the beans. You will have to combine both services to make something worthwhile…

Read more »

Tags: , , , , , , , , , , , , , , , , , , , , ,

Teotihuacan – Walk Through – echoCTF

Posted in Hacking, Information Security, Tutorials, Walk Throughs, Write Ups on January 18th, 2022 by admin

IP Address:
Description: Just like the pyramids of Teotihuacán, this target feels like a step-pyramid
Extra Info: Just like a step-pyramid from Teotihuacán, you have to climb step-by-step until you reach the top. You have to get the following flags

Read more »

Tags: , , , , , , , , , , , , , ,

WannaCrypt Ransomware: Prevention and Cure

Posted in General, Hacking, Information Security on May 15th, 2017 by admin

WannCry Ransomware

Read more »

Tags: , , , , , , , , , , ,

Hacking and Securing DSL Routers

Posted in General, Hacking, Information Security, ISP, Telecom, Tutorials on July 9th, 2015 by admin

(Note: If you know how DSL works, you can jump to the next section!)
Most of the internet users nowadays are using DSL connections. DSL stands for Digital Subscriber Line which provides internet over telephone lines. DSL uses ADSL Routers or ADSL Modems. Here is a layman diagram of how DSL works:

Whenever a user turns on their DSL modem, they are connected to the DSLAM which is usually placed inside ISP Exchange. Each DSLAM has the capacity to connect with thousands of DSL users. In above image, it looks like a small box but actually it is much bigger:

DSLAM is responsible for checking the condition of telephone line and assures that a stable connection can be maintained. It also holds some properties for each telephone line. The Download and Upload Rate you see in your modem status page are also set by DSLAM. Once the DSLAM connection is established, the DSL light on some modems is turned on.

Now the modem sends Internet Access request to the BRAS server. This request contains the DSL username and password which is saved in the DSL modem settings. The login is usually set by the lineman when they install a new DSL connection. The BRAS server is directly connected with the central RADIUS server which contains login information of all DSL users. The RADIUS server also contains a list of IP Addresses which are not used by others. If the login sent by modem is valid, RADIUS server responds with one IP Address from the IP Address list. Once the modem receives the IP Address, an internet connection is established and the internet light on modem is turned on:

That was some lengthy introduction about DSL and its working for non-technical people!

Read more »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cyber Crime Bill in Pakistan: The Bright Side

Posted in General, Hacking, Information Security, ISP, Telecom on June 26th, 2015 by admin

Cyber Crime Laws in Pakistan
If you belong to Pakistan you might have seen the recent fuss about the “Controversial Cyber Crime Bill” that will snatch the basic rights of internet users.
This bill will take away everything including your internet privacy, freedom of speech and liberty. Once passed, it will be a cyber apocalypse for Pakistan.
At least this is what the media is projecting about that bill.

Read more »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,