-
Tryhackme Methodology (WEB orientated)
Hi everyone im the Gray Hatter and this is my blog. Cibersecurity, as the same that other disciplines and sciences requires following a list of steps to orientate the investigación in the right way, avoiding false conclusions and making sure every step give you the truth of something real. Thats called Scientific Method. In cibersecurity…
-
Dirseach Tool relevance
Hi everyone im the GrayHatter and thats my Blog. Cibersecurity and IoT passioner and system administrator in Cesur Formación especialiced in cibersecurity and linux administración In the daily activities of a Pentester or Ethical Hacker is necesary to use a long variety of tools to do the penetration test more efficient and fast. From the…
-
The ADB problem
By Gray Hatter Most of our common IoT devices are linux based plataforms like mobiles, tablets, TVs, IPCameras and even washing machines. That has lots of advantages but also has disadvantages that i will write about in this entry.
-
The TryHackme 8
By gray hatter 1. scanning: nmap // dirsearch 2. Exploitation: metasploit // burpsuit 3. Privilege Escalation: linpeas // winpeas 4 Post-Exploitation: msfvenom // meterpreter
-
Welcome everyone
Hello, im GrayHatter thats my blog. I will keep writing content every day of differents themes. Everyday more and more IoT devices brings us the possibility to break it. This blog is about my discoveries, researches and laboratories in the global enviroment of cybersecurity.
