• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
KaliTut

KaliTut

Kali Linux tutorial and Linux system tips

  • Home
  • Raspberry Pi
  • Privacy Policy
  • About us

What are hashes and how are they used

Last Updated on July 14, 2020 by Kalitut Leave a Comment

What are hashes and how are they used?
The hash sum (hash, hash code) is the result of processing some data by the hash function (hashing).

what are hashes

Hashes: type definition, checksum count, non-standard and iterated hashes 

[Read more…] about What are hashes and how are they used

Filed Under: General Tagged With: hashing

How to use ghidra to attack crackme

Last Updated on July 19, 2020 by Kalitut Leave a Comment

A practical example of How to use ghidra to attack crackme
First Download crackme from the site MalwareTech , the password to the archive – too  MalwareTech.

How to use ghidra

So, let’s see what is in the archive. We see the executable file  vm1.exe and dump file  ram.bin. The explanation on the site says that we are dealing with an eight-bit virtual machine. The dump file is nothing more than a chunk of memory, in which random data and a flag that we need to find are interspersed. Let’s leave the dump file alone for a while and take a look at  vm1.exe through the DiE program.

[Read more…] about How to use ghidra to attack crackme

Filed Under: General Tagged With: ghidra

The zodiac cipher is still a mystery

Last Updated on July 14, 2020 by Kalitut Leave a Comment

Zodiac killer cipher, October 20, 1968, Benicia, California, USA. A motorcyclist found the bodies of a young couple in the alley. A few months later, another couple was shot in a park several kilometers away. The killer later reported to the police station in the telephone booth. In addition to acknowledging his own murder, he also claimed responsibility for the first murder.

zodiac killer cipher

zodiac 408 cipher and 340 cipher

On August 1, 1969, the killer sent an e-mail to three local newspapers at the same time, claiming that he was a criminal and proved the details of the killing scene. At the same time, he also put different encrypted text in the e-mail, threatening newspapers must be announced before August 1 (Friday), otherwise, it will be from Friday until Sunday, until killing enough 12 people. In one email, the killer claimed that the ciphertext contained his identity information. These emails have a total of 408 symbols, and they are customarily referred to as 408 ciphers.

[Read more…] about The zodiac cipher is still a mystery

Filed Under: General Tagged With: zodiac cipher

USB flashing led raspberry pi – show status

Last Updated on May 28, 2020 by Kalitut Leave a Comment

USB Flashing Led

flashing led raspberry pi

The blink (1) is great for showing a status or condition. For example, a service status is interesting. So, whether service or service started or not started. Or to put it another way, whether he is running or not.
What is the blink (1)?
blink (1) by ThingM is a USB stick with a RGB LED that can be controlled by software. In this case, blink (1) can accept any RGB color and flash, flash or just permanently light up. This is interesting for any kind of status display, without electronics or other hardware tinkering.

[Read more…] about USB flashing led raspberry pi – show status

Filed Under: General Tagged With: flashing led raspberry pi

Overclocking Basics

Last Updated on May 24, 2020 by Kalitut Leave a Comment

Overclocking is part of PC tuning and refers to methods to increase the speed of transmission or processing of clock-dependent components. As a rule, the clock rate is increased in order to operate the component above its nominal clock. You can overclock the processor, the memory bus of the main memory and the graphics card. The biggest performance gain can be achieved by overclocking the processor.
If you want to overclock, you must familiarize yourself with the functionality and interaction of the hardware components involved. Benefits, risks and side effects must be determined exactly.

When overclocking attempts must always be expected that system components are damaged or destroyed. Therefore you should create a backup of your data before overclocking. Even better, try overclocking on a fresh system.

[Read more…] about Overclocking Basics

Filed Under: General Tagged With: Overclocking

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to Next Page »

Follow us

  • Facebook
  • Twitter
  • YouTube

Categories

  • Android pentesting tools
  • Arduino
  • Books
  • Darknet
  • database
  • General
  • Github Tools
  • Hacking
  • Kali Linux
  • Linux
  • Linux Commands
  • Network Administrator
  • Penetration Testing
  • Penetration Testing Tools
  • PowerShell
  • Raspberry Pi
  • resources
  • Review
  • Termux
  • Tutorials
  • Ubuntu
  • Uncategorized
  • Video Tutorials
  • vmware
  • WiFi Adapter
  • WiFi Pentesting
  • Wireless Router
  • Wireshark

Recent Posts

  • Hijacked Wi-Fi? Thorough explanation of hacking techniques
  • Windows PowerShell tutorial for beginners
  • Learn to Hack Steps from Beginner to Hacker
  • PowerShell Tutorial – GUIDE introduction with basics
  • Top Hacking Tools
  • Home
  • About us
  • Privacy Policy
  • Affiliate disclaimer

Copyright © 2023