ord function is to convert a character to its equivalent integer representation. chr function is to convert the integer to its character representation. random.choice() method randomly picks a character from a series of characters to form a string of N length, this is the key for encryption and decryption. A message is taken from user's … Continue reading [python]Hand made cryptography with XOR method.
NMAP nmap -sC -sV -oN bastard.nmap -vvv 10.10.10.9 Drupal I was using nikto -host 10.10.10.9 and found that there is a robots.txt, there are other text files as well, but the robots.txt may give good information about the web directories. changelog.txt By reading robots.txt I found that there is a changelog.txt, this changelog.txt would give … Continue reading [hackthebox]Bastard
There is no excerpt because this is a protected post.
This is the first time I have heard of this function, this is the same as python's args for unknown number of positional arguments in a function.
I am using fmt.Scanln() to read user's input, the reader stops at newline, on previous case I use fmt.Scanf() but it reads the first input and terminates. This is part of an exercise for my golang tutorial.
Reference: https://github.com/golang/go/wiki/Iota iota is used to declare incremental constants, each constant block will start iota with 0, then each constant within the block will increment the iota. Iota resets back to 0 if it is declared on another constant block.
Another exercise on golang, experience in python helps me pick up golang rather quickly. calculate the area of a circle.
This is an exercise of my golang course. The purpose is to convert Fahrenheit to Celcius
I have been doing a few HTB machines and used some tools for enumeration and a lot of those tools are made from Golang, I wished to create my own tool in Go and hence I am starting to learn about the language. Here is a code snippet on how to interact with OS commands. … Continue reading [Go]Execute commands in Linux
Introduction Jeeves is a machine that is rated easy, this machine is hacked through exploiting unauthenticated jeeves dashboard usage. A java reverse shell is executed in Jeeves' console script (where groovy script can be run for troubleshooting) is run and a reverse connection is connected back to my netcat server. Once the reverse connection is … Continue reading [hackthebox]Jeeves