Futaba _ Webs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Cipher Text Analysis πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Today, we are going to go over something fun, and do a CTF, one which involves cipher analysis and a bit of binary analysis in order to solve it. This is also going to cover a bit of obfuscation techniques such as using an encoder to mask the contents of the file to change it’s overall file structure and throw off security systems.

πŸŽƒ Article πŸŽƒ Glossary πŸŽƒ Catalog πŸŽƒ Home πŸŽƒ Search Mode

πŸŽƒ Article Glossary

πŸ•Έ Synopsis πŸ•Έ

Today, I'm going to talk more about ransomware attacks and how to prevent them. This is to raise more awareness on proper Cyber Security data Hygiene methods, as well as other techniques that can be used to prevent any real damage should this attack connect. This article is also going to feature some of my formal QA answers from a recent interview I did most recently.

Disclaimer

As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, let's begin!

πŸ•Έ Article Topics πŸ•Έ

I'll be discussing the following topics in order:

πŸŽƒ Premise

πŸŽƒ What is a CTF(Capture The Flag)?

You can click on any of the topics to simply check that one out if it interests you!

NOTE: Articles are read from LEFT to RIGHT via 2 columns! Read the first column all the way down and then move to the next one!

πŸ•Έ Key Links πŸ•Έ

Here's a quick run down on all the main links that are in the article in case you want to check them out first.

πŸŽƒ LinkedIn Version

πŸŽƒ Patreon Version

πŸŽƒ Cipher Text Analysis

Premise πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

A giant chunk of the demonstration for today is going to mostly be video, but the article is going to explain what I’m doing in the video as you watch me solve the challenge LIVE.

In the patreon version I tell you where the CTF comes from which is MAJOR info if you are looking for a potential interview.

What is a CTF(Capture The Flag)? πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

CTF’s are a series of competition style challenges where hackers exploit vulnerabilities in order to acquire a series of flags.

It’s designed as a testing ground where hackers can hone their skills and practice finding real vulnerabilities on real vulnerable systems to practice what they know, securing them a flag in the process. It’s the best form of practice, while also keeping it ethical and legal.





portfolio img

If you like to see the more advanced version of this article that talks about methods that can be used to mitigate, as well as any videos included, SUBSCRIBE TO MY PATREON CYBER SECURITY TIER!

If you enjoyed this post give it a thumbs up! I’ll be keeping track of whose reacting from now on as there is a β€œspecial” reason for it. Just know the more you support my content the more there is in stored!


- The Hacker Who Laughs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

portfolio img

πŸŽƒ CONTACT ME

AnOnYmOuS

futaba.webs@gmail.com

New York, NY United States