Results for The.mikkel talk block log uploads logs
A user with 17 edits. Account created on 4 May 2024.
4 August 2025
- 10:5610:56, 4 August 2025 diff hist +8,640 N Hydra Created page with "'''Hydra''', often referred to as '''thc-hydra''', is a parallelized network logon cracker. It is an essential tool for any CTF player when faced with a login prompt on a network service. This page serves as a quick reference for common Hydra commands and syntax. == Core Syntax == The basic structure of a Hydra command is: <code>hydra [options] [[//service] | [service://]]<target>[:<port>]</code> The most critical options define the credential lists: * '''<code>-l <USE..." current Tag: Visual edit
- 10:5210:52, 4 August 2025 diff hist +88 Tools Add Hydra page current Tag: Visual edit
- 09:4709:47, 4 August 2025 diff hist +31 N Setoolkit Created page with "https://www.kali.org/tools/set/" current Tag: Visual edit
- 09:4709:47, 4 August 2025 diff hist +101 Tools Added setoolkit Tag: Visual edit
- 09:1409:14, 4 August 2025 diff hist +32 Nmap →Essential Options current Tag: Visual edit: Switched
2 May 2025
- 18:1118:11, 2 May 2025 diff hist +4 Hashcat No edit summary current Tag: Visual edit
- 16:1016:10, 2 May 2025 diff hist +4,457 N Nmap Created page with "== Nmap CTF Quick Reference == Common Nmap commands optimized for speed and typical CTF scenarios. === Essential Options === * <code>-p-</code> : Scan all 65535 TCP ports. * <code>-p <ports></code> : Scan specific ports (e.g., <code>-p 21,22,80,443</code>, <code>-p U:53,T:80</code>). * <code>-T4</code> : Aggressive timing (faster, good for CTFs). Use <code>-T3</code> (default) if <code>-T4</code> causes issues. * <code>-Pn</code> : Skip host discovery (Assume host..."
30 April 2025
- 21:2421:24, 30 April 2025 diff hist +8 Tools No edit summary
- 21:2221:22, 30 April 2025 diff hist +6,931 Tools No edit summary
- 21:1421:14, 30 April 2025 diff hist +2,742 N Hashcat Created page with "== Hashcat == '''Hashcat''' is a powerful password recovery tool, known for being one of the fastest based on its highly optimized kernel code that can leverage GPUs and other hardware accelerators. It supports a vast number of hash types and attack modes, making it a versatile tool for cracking. Hashcat is frequently used in CTFs for cracking challenges where performance is key, such as: * Cracking various password hashes much fas..."
- 21:1121:11, 30 April 2025 diff hist +1,765 N John the Ripper Created page with "== John the Ripper == '''John the Ripper''' (often shortened to '''JtR''') is a widely used, powerful password cracking tool. It is designed to detect weak Unix passwords, but it also supports hundreds of hash and cipher types, including many commonly found in software and files (like zip files, rar files, and pdfs). It is an essential tool in cracking challenges in CTFs, often used to: * Crack password hashes found in various formats. *..."
- 21:0621:06, 30 April 2025 diff hist +819 N Steghide Created page with "== Steghide == '''Steghide''' is a command-line steganography tool used to hide secret data within cover files (typically JPEG, BMP, WAV, or AU files) and extract data hidden using the same method. It often requires a passphrase for extraction. Commonly used in forensics challenges to extract hidden flags or messages from provided media files. === Basic Extraction Example === To extract potentially hidden data from a file named ''challe..."
- 20:5920:59, 30 April 2025 diff hist +253 Tools No edit summary
4 May 2024
- 06:3606:36, 4 May 2024 diff hist +53 Main Page No edit summary
- 06:3406:34, 4 May 2024 diff hist −13 SQL Map Remove duplicate header
- 06:3406:34, 4 May 2024 diff hist +457 N SQL Map Initial tool page
- 06:1906:19, 4 May 2024 diff hist +68 Tools Add SQL map tool