hacking
Active Recon Resources
· ☕ 4 min read
Active Reconnaissance To gather intelligence by actively engaging the target. In the active recon phase, we’re planning our future phases, like exploitation, by actively collecting information on the target. Few examples: ~ What targets were found and what ports are open?

Passive Recon(OSINT) Resources
· ☕ 14 min read
Passive Reconnaissance To gather intelligence without actively engaging the target. In the passive recon phase, we’re planning our future steps by passively collecting information on the target. Few examples: ~ Any email formats found? ~ What names can we find related to the target?

DC-3 of DC Series(vulnhub)
· ☕ 20 min read
I enjoyed DC-2’s Tom & Jerry theme! It showed us the concept of credential reuse and weak passwords, along with the wordpress and SUID exploits/abuses. Anyways, now onto DC-3.2 aka DC-3! Dropdown to see DC-3's quick overview DC-3 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.

DC-2 of DC Series(vulnhub)
· ☕ 18 min read
With DC-1 out of the way, let’s move onto DC-2 of the DC Series! Dropdown to see DC-2's quick overview Much like DC-1, DC-2 is another purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing.

DC-1 of DC Series(vulnhub)
· ☕ 13 min read
Let’s root DC-1! Details can be found at https://www.five86.com/dc-1.html Open this to see the box's overview pulled from the above website. DC-1 is a purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing. It was designed to be a challenge for beginners, but just how easy it is will depend on your skills and knowledge, and your ability to learn.