#FromZeroToHacker

2023-10-30

Everybody knows about TryHackMe, HackTheBox, and OverTheWire. But did you know about Atenea?

Atenea is a free security challenge platform developed by the (Spanish) National Cryptologic Center (CNN), under Spain’s National Intelligence Centre (CNI).

#FromZeroToHacker #Atenea

letslearnabout.net/hacking/fro

2023-10-23

After 3 weeks of studying, I'm seeing a gap in knowledge between me and other people I study with.

While I know my way around programming, web development, etc, I only know a bit of #Linux and absolutely nothing about #Networking...

And this is how I fixed it during my #FromZeroToHacker journey 🙂​

letslearnabout.net/hacking/net

2023-10-19

One of the things I have learned in my studies is the role of #DevOps, a role I haven’t considered until now.

DevOps seems like an interesting career choice, but: What does DevOps do? What tools do they use? How you can become one?

Learn more about DevOps and the #FromZeroToHacker roadmap here:

letslearnabout.net/hacking/fro

2023-10-15

Changes and more changes while doing my #FromZeroToHacker challenge.

Now, it will be more interesting for you. Learn why:

letslearnabout.net/hacking/fro

2023-08-23

Day 083 becoming a hacker!

Time to learn about active recon, web app attacks and privilege escalation with a simulated target.

Let’s learn about it in our daily #FromZeroToHacker challenge.
#FromZeroToHacker #Hacking #hacker #ethicalhacker

letslearnabout.net/hacking/fro

2023-08-22

Day 082 becoming a hacker!

Without encryption, communications would be very insecure and would be easy for a hacker to see your data. Luckily, almost all the data you send and get is encrypted and can’t be seen in plain text.

Let’s decrypt all the information about cryptography in our daily #FromZeroToHacker challenge.

#FromZeroToHacker #Hacking #hacker #ethicalhacker #crytpography

letslearnabout.net/hacking/day

2023-08-22

Day 082 becoming a hacker!

Without encryption, communications would be very insecure and would be easy for a hacker to see your data. Luckily, almost all the data you send and get is encrypted and can't be seen in plain text.

Let's decrypt all the information about cryptography in our daily #FromZeroToHacker challenge.

#FromZeroToHacker #Hacking #hacker #ethicalhacker #Cryptography

2023-08-21

Day 081 becoming a hacker!

Geolocating images is the process of finding out the real-world location of an image.

Let’s find out how ffuf works in our daily #FromZeroToHacker challenge.

#FromZeroToHacker #Hacking #hacker #ethicalhacker #geolocating

letslearnabout.net/hacking/fro

2023-08-20

Day 080 becoming a hacker!

ffuf stands for Fuzz Faster U Fool and it’s a tool written in Golang used for web enumeration, fuzzing, and directory brute forcing.

Let’s find out how ffuf works in our daily #FromZeroToHacker challenge.

#FromZeroToHacker #Hacking #hacker #ethicalhacker #ffuf

letslearnabout.net/hacking/fro

2023-08-19

Day 079 becoming a hacker!

Bash scripting is a powerful tool to automate sysadmin tasks, manage system resources and more.

Let’s learn to Bash it through our daily #FromZeroToHacker challenge.

#FromZeroToHacker #Hacking #hacker #ethicalhacker #Bash

letslearnabout.net/hacking/day

2023-08-18

Day 078 becoming a hacker!

Professional hackers don’t do whatever they want, they need to follow an established process, or methodology, to understand the target system first, and then exploit it later.

Let’s learn their methods in our daily #FromZeroToHacker challenge.

#FromZeroToHacker #Hacking #hacker #ethicalhacker

letslearnabout.net/hacking/day

2023-08-17

Day 077 becoming a hacker!

Nessus vulnerability scanner is what it does say on the tin: A vulnerability scanner. Using techniques similar to Nmap, but presenting the information in a beautiful GUI.

Let’s learn more about this tool in our daily #FromZeroToHacker challenge.
#FromZeroToHacker #Hacking #hacker #ethicalhacker #Nessus

letslearnabout.net/hacking/day

2023-08-16

Day 076 becoming a hacker!

Hydra is a brute force online password cracking program and a quick system login password hacking tool. Hydra can run a list and brute-force authentication services, especially if they have weak passwords.

Let’s learn more about this tool in our daily #FromZeroToHacker challenge.

#FromZeroToHacker #Hacking #hacker #ethicalhacker #Hydra

letslearnabout.net/hacking/fro

2023-08-15

Day 075 becoming a hacker!

Proper enumeration should be done before any exploitation attempts are made, as the more knowledge we have, the more vectors attack we may use. Nmap is the tool for it.

Let’s map our knowledge in our daily #FromZeroToHacker challenge.

#FromZeroToHacker #Hacking #hacker #ethicalhacker #Nmap

letslearnabout.net/hacking/day

2023-08-12

Day 072 becoming a hacker!

“Malware” consists of two words combined: Malicious and Software. Malware is designed to damage computers and/or networks.

Let’s learn more about the history of malware in our daily #FromZeroToHacker challenge.

#FromZeroToHacker #Hacking #hacker #ethicalhacker #Malware

letslearnabout.net/hacking/day

2023-08-11

Day 071 becoming a hacker!

Cryptography is used to protect confidentiality, ensure integrity and authenticity. Even if we don’t notice, we use encryption when we connect to SSH, our back or even download a file.

Let’s learn more about this topic in our daily #FromZeroToHacker challenge.

#FromZeroToHacker #Hacking #hacker #ethicalhacker #cryptography

letslearnabout.net/hacking/day

2023-08-10

Day 070 becoming a hacker!

John the Ripper is one of the most used hash-cracking tools out there. Fast, great range of hash types and loads of tutorials and information.

Let’s slash it through this topic in our daily #FromZeroToHacker challenge.
#FromZeroToHacker #Hacking #hacker #ethicalhacker #cryptography

letslearnabout.net/hacking/fro

2023-08-09

Day 069 becoming a hacker!

Hashing is the process of transforming a given key or string of characters into another value. This is especially useful when we are dealing with passwords.

Let’s learn about this topic in our daily #FromZeroToHacker challenge.

#FromZeroToHacker #Hacking #hacker #ethicalhacker #cryptography

letslearnabout.net/hacking/fro

2023-08-08

Day 068 becoming a hacker!

As nowadays we use the Internet for everything, cyber-attacks are a common occurrence. What types or common attacks exist? How we can defend ourselves from them?

Let’s make our internet experience safer in our daily #FromZeroToHacker challenge.

#FromZeroToHacker #Hacking #hacker #ethicalhacker

letslearnabout.net/hacking/fro

2023-08-07

Day 067 becoming a hacker!

Based on a report from IBM, human errors were the main reason for 95% of successful cyber attacks. That is why security awareness is so important.

Let’s learn how we can be more secure in our daily #FromZeroToHacker challenge.

#FromZeroToHacker #Hacking #hacker #ethicalhacker

letslearnabout.net/hacking/day

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst