TryHackMe Kenobi Walkthrough

Tryhackme Kenobi walktrough

Kenobi is another great room to improve your penetration testing skills. If you had liked the Pickle Rick room of the Tryhackme, there is a chance you will also like the Tryhackme Kenobi room. This room is named in honor of Obi-Wan Kenobi, a Star Wars character. A smart way to learn is to try …

Read more

TryHackMe Pickle Rick Walkthrough

Tryhackme Pickle Rick walkthrough

This is one of the most interesting beginner-friendly level rooms on Try Hack Me. If you are familiar with the Rick and Morty, well, this room is based on them – you have to help Morty find the 3 ingredients that will help Rick make a potion that will transform him from the pickle back …

Read more

TryHackMe Vulnversity Walkthrough

Vulnversity walkthrough

Welcome to the Tryhackme write-up series. Today we going to analyze a room that should be one of the first ones for everyone that starts a journey on Try Hack Me. The room is called Vulnversity. This room focuses on active reconnaissance and the main tools for it, it has tasks related to web application …

Read more

OWASP Membership – Is It Worth It?

OWASP membership is it worth it

Probably majority of the cybersecurity (and development) specialists, know about the OWASP organization. Being out there for a long time, Open Web Application Security Project became a synonym for various security practices and vulnerable applications. As the OWASP is non-profit organization, most of the projects are led by the community. And the main brainpower behind …

Read more

Sublist3r – Tool for Enumerating Subdomains

Sublist3r is one of the most widely used tools for enumerating subdomains. A Python based script that uses OSINT, can help you to identify every subdomain of the target. At the moment of publishing this article, Sublist3r has almost 6000 stars on GitHub. This shows that the tool is pretty popular and is one of …

Read more

How to Install Kali Linux on Raspberry Pi 4?

How to install Kali Linux on Raspberry Pi 4

Long are the days when computers taking a whole room. were norm. Nowadays a fully functional computer can be fitted into a palm. The current technological possibilities benefit every industry. Cybersecurity is not an exception. If dedicated expensive hardware was needed back in the days to have a “hacking station”, today a microcomputer, costing several …

Read more