Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
21 views2 pages

Hacking Info

Uploaded by

hriday Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views2 pages

Hacking Info

Uploaded by

hriday Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

1.

Cryptography: Focuses on breaking encryption systems using weaknesses like small


primes, reused nonces, and padding oracles.

2. Web Exploitation: Involves exploiting vulnerabilities in web applications, such as


SQLi, XSS, and file uploads.

3. Pwn (Binary Exploitation): Targets memory corruption vulnerabilities in binaries, like


buffer overflows and ROP chains

4. Reverse Engineering: Analyzes compiled binaries to understand their logic or bypass


security mechanisms.

5. Forensics: Recovers and analyzes digital data from artifacts like PCAPs, memory
dumps, and disk images.

6. Steganography: Involves hiding and uncovering secret data within media files or
metadata
.
7. Miscellaneous: Covers diverse tasks like OSINT, fuzzing, IoT, and logic puzzles.

1. General Strategy

Strategy Details
Install via Kali Linux/BlackArch: Ghidra, pwntools, Burp Suite, zsteg,
Core Tools
volatility, ffuf, etc.
Create payload cheat sheets for Web (XSS, SQLi), Crypto (XOR, RSA), and
Cheat Sheets
Pwn (ROP chains).
Automation Scripts for brute-forcing, decoding, API interactions.
Chaos Mode Prioritize speed and easy points. Use automation and skip high-difficulty
Tip tasks unless necessary.

2. Categories & Focus Areas

Cryptography

Focus Details
Known Weaknesses Small RSA primes, reused nonces, padding oracles.
Techniques Mod math, stream cipher analysis, frequency attacks.
Tools Python, SageMath, RsaCtfTool, CyberChef.
Web Exploitation

Focus Details
Targets XSS, SQLi, CSRF, JWT, SSTI, SSRF, file uploads.
Tools Burp Suite, curl, ffuf, sqlmap, httpie, Python scripts.

Pwn (Binary Exploitation)

Focus Details
Techniques Buffer overflow, format string, heap attack, ROP chains.
Tools pwntools, gdb, gef, radare2, one_gadget.

Reverse Engineering

Focus Details
Skills Static/dynamic analysis, control flow, anti-debug.
Tools Ghidra, IDA Free, objdump, strace, rizin.

Forensics

Focus Details
Focus Areas PCAP analysis, RAM dumps, deleted files, hidden volumes.
Tools Volatility, Wireshark, binwalk, ExifTool, Autopsy.

Steganography

Focus Details
Focus Areas LSB, image/audio/video manipulation, metadata.
Tools stegsolve, zsteg, steghide, StegCracker, OutGuess.

Miscellaneous

Focus Details
Tasks OSINT, fuzzing, IoT, logic bombs, phishing.
Tools The Harvester, recon-ng, photon, firmadyne.

You might also like