Posts

WILL CHATGPT END THE WORLD?

Image
                          INTRODUCTION      ChatGPT seems to be everyone's favourite natural language input AI chatbot that has been on everyone's lips since it it was officially launched on 30th November by the OpenAI team. And, not gonna lie, it has somewhat lived up to the hype. From answering simple and straight forward questions like, "How to make Caesar salad" to solving complex coding problems, ChatGPT seems to have all of it covered. But how was it even made? How long did it take the OpenAI team? Since its so smart, can it take our jobs? Will ChatGPT eventually snap and take over the world and make us humans slaves? Come to think of it, being slaves to a machine would actually suck. Imagine doing tasks that the machines can do a lot faster and more efficiently but the machine would just make us do it anyway to see us suffer 🤔🤔. Let's dive into the phenomenon that is becoming Ch...

SOLUTION TO THE ROTOHASH CHALLENGE (BOUNTYCON 2022)

Image
  Note: This solution is provided by Sudip Shah and in his exact words and methodology. Enjoy! The Challenge: Challenge Lets see what the  script.py  contains : script.py As previously mentioned about programming, I didn’t properly understand the code but after multiple glances at the code, I came to know that the string is rotated and then hashed to md5 value. And yes, as you might have guessed, md5 hashes can’t be decrypted and can only be cracked. I saw the input rotation is an integer so yes the numbers, then I tried fuzzing the numbers from 1 to (length of the string ) and printing it inside the rotate function. Then I tried rotating the string through negative integers. The code snippet looked as, fuzzing and printing the rotatefunction without hashing to see what’s happening Then I got some ideas from this source . Now it’s time to hop into the server and try it . A netcat connection was sent and we were to input the integer and output would be the rotated then md5...

THE REAL ORIGIN OF THE JOKER REVEALED

Image
                                                     THE JOKER (ORIGINS)                 The Joker, Batman’s arch nemesis and ,in my opinion, one of the greatest villains ever. But where did he come from and how did he get to be the psychopathic   killer he turned out to be.   What level of inner demons could drive a human to kill other humans just for his own pleasure and amusement. In this blog post, we’re going to finally look at the proper origin story of the Joker.                                       Ok, I admit the title was probably just cl...

7 COMPLETELY WEIRD BUT USEFUL THINGS YOU CAN DO ON THE INTERNET

7 COMPLETELY WEIRD BUT USEFUL THINGS YOU CAN DO ON THE INTERNET No doubt the internet is a weird place to be the only challenge is it is that useful? When I started out in programming/hacking and general IT stuff, I always liked to ask the guru's in that field questions and they all gave the same answer almost all the time, "GOOGLE IT". Yes, it was hella frustrating and I thought they were just being proud and unnecessarily wicked (I mean, why would you tell me to do research when you can just tell me the answer right now? 😩). But then when I actually googled I found out something, it is actually easier to just google it for real (no cap). And now I even give the same answer to all the people who also DM me with technical questions, "JUST FREAKIN GOOGLE IT". Other times, I just google their exact question myself then send them a screenshot of the first few results (so they get the idea). The amount of stuff you can actually find and do on the internet is en...

THM VULNVERSITY WALKTHROUGH

Image
This blog post will be sort of a walkthrough for the TryHackMe room, Vulnversity. For learning the basics of active recon, web app attacks and privilege escalation. As always, I wont be revealing the actual flags, rather I will guide you to them. After starting the machine and connecting to the TryHackMe server(either by vpn or using their own web based OS), the IP of the vulnerable machine is revealed (after a few seconds of course). If you're using vpn connection you can also ping the given IP to ensure you're properly connected. The first part is recon using nmap. Pretty straight forward, enter the following command: nmap -sV <insert the machine's IP here>. The -sV tag to get the version of the identified ports. From the nmap scan result you will be able to identify how many ports are open and the version of squid proxy. By reading the intro of part 2, you should be able to also answer the next two questions. The most likely OS the vulnerable machine is running is ...

HOW TO SOLVE HACK THE BOX INVITE CHALLANGE

Image
  HOW TO SOLVE HACK THE BOX INVITE CHALLANGE Hack the box is an interesting site for both beginners and advanced hackers/ info sec enthusiasts. It is basically a site to practice and perfect your skills. And the most interesting part is not everyone can get in! That's right, hack the box has an "sign in" challenge. You basically have you hack your way in 😓😓. So in this blog post I am going to show you how I solved the sign in challenge, even though there are probably other ways to solve it (maybe even shorter or easier methods) The invite link is  here The first thing that comes to my mind is developer tools (right click on the page and choose inspect element). So I look through it but can't find anything particularly interesting. So I click on the hint button.  The hint says we should check the console. So that's where I go.  In the console we see this weird looking skull (lol). But under we see another hint that says something about a weird js script that the ...