Open in app

Sign in

Write

Sign in

David Varghese
David Varghese

156 Followers

Home

Lists

About

Published in

Level Up Coding

·Nov 13

Traceroute: Explained

The what, why and how of the network debugging tool traceroute — Image by rawpixel.com on Freepik The Internet is a globally distributed network of interconnected devices. It is made up of a large number of independently operated networks. The internet is completely distributed and no one has central control over it. A network of such scale is bound to face issues…

Command Line

8 min read

Traceroute: Explained
Traceroute: Explained
Command Line

8 min read


Published in

Level Up Coding

·Aug 4

How to Convert Python Script to an Executable (.exe)

Create executable from Python code easily using a simple and intuitive GUI Introduction To be able to run Python code the Python interpreter has to be installed on the system. But there are situations where we want end users to be able to run our code without installing Python. …

Programming

7 min read

How to Convert Python Script to an Executable (.exe)
How to Convert Python Script to an Executable (.exe)
Programming

7 min read


Published in

InfoSec Write-ups

·Jul 16

TryHackMe - Snapped Phish-ing Line

Apply learned skills to probe malicious emails and URLs, exposing a vast phishing campaign — Cover Image Background by BiZkettE1 on Freepik TryHackMe | Snapped Phish-ing Line Task 1: Challenge Scenario Premise Setup Disclaimer Based on real-world occurrences and past analysis, this scenario presents a narrative with invented names, characters, and events. Please note: The phishing kit used in this scenario was retrieved from a real-world phishing campaign. Hence, it is advised…

Security

6 min read

TryHackMe - Snapped Phish-ing Line
TryHackMe - Snapped Phish-ing Line
Security

6 min read


Published in

InfoSec Write-ups

·Jul 10

TryHackMe - Agent Sudo

You found a secret server located under the deep sea. Your task is to hack inside the server and reveal the truth — Cover Image Background by BiZkettE1 on Freepik TryHackMe | Agent Sudo You found a secret server located under the deep sea. Your task is to hack inside the server and reveal the truth.tryhackme.com Task 1: Author note Welcome to another THM-exclusive CTF room. Your task is simple, capture the flags just like the other CTF room. Have Fun!

Security

8 min read

TryHackMe - Agent Sudo
TryHackMe - Agent Sudo
Security

8 min read


Published in

InfoSec Write-ups

·Jun 29

VulnHub - Kioptrix: Level 3 (1.2) (#3)

Learn the basic tools and techniques used in vulnerability assessment and exploitation in a gamified manner — Cover Image by vector_corp on Freepik Description As with the other two, this challenge is geared toward the beginner. It is however different. Added a few more steps and a new skill set is required. Still being the realm of the beginner I must add. The same as the others, there’s…

Security

13 min read

VulnHub - Kioptrix: Level 3 (1.2) (#3)
VulnHub - Kioptrix: Level 3 (1.2) (#3)
Security

13 min read


Published in

InfoSec Write-ups

·Jun 19

VulnHub: Kioptrix Level 2 (1.1) (#2)

Learn the basic tools and techniques used in vulnerability assessment and exploitation in a gamified manner — Cover Image by vector_corp on Freepik Description This Kioptrix VM Image is an easy challenge. The object of the game is to acquire root access via any means possible (except actually hacking the VM server or player). The purpose of these games is to learn the basic tools and techniques in…

Security

8 min read

VulnHub: Kioptrix Level 2 (1.1) (#2)
VulnHub: Kioptrix Level 2 (1.1) (#2)
Security

8 min read


Published in

InfoSec Write-ups

·Jun 14

VulnHub: Kioptrix Level 1 (#1)

Learn the basic tools and techniques used in vulnerability assessment and exploitation in a gamified manner — Cover Image by vector_corp on Freepik Description This Kioptrix VM Image is an easy challenge. The object of the game is to acquire root access via any means possible (except actually hacking the VM server or player). The purpose of these games is to learn the basic tools and techniques in…

Security

8 min read

VulnHub — Kioptrix Level 1 (#1)
VulnHub — Kioptrix Level 1 (#1)
Security

8 min read


Published in

Level Up Coding

·Jun 10

Dynamic Host Configuration Protocol (DHCP): Explained

DHCP the protocol that enables automatic assignment of IP addresses to hosts on a network — Banner graphic by Freepik For a device to be able to communicate with other devices (on LAN and Internet) it needs to have an IP Address. IP addresses are unique numeric identifiers that are used to identify devices on a network. IP addresses based on how they are assigned are…

Networking

8 min read

Dynamic Host Configuration Protocol (DHCP): Explained
Dynamic Host Configuration Protocol (DHCP): Explained
Networking

8 min read


Published in

Level Up Coding

·May 6

Network Address Translation (NAT): The What, Why and How Explained

Overview of NAT the private IP to public IP translator — What is NAT? NAT stands for Network Address Translation. It is a protocol that is used to map a private IPv4 address to a public IPv4 address. The translation process is performed by a traffic-routing device like a router. …

Networking

11 min read

Network Address Translation (NAT): The What, Why and How Explained
Network Address Translation (NAT): The What, Why and How Explained
Networking

11 min read


Published in

Level Up Coding

·Apr 15

DNS: The What, Why, and How Explained

Exploring DNS the phonebook of the internet — Banner graphic by Vectorjuice on Freepik What is DNS? Domain Name System (DNS) is a hierarchical distributed naming system for devices on the internet. It is used for translating domain names to IP Addresses. DNS is like a phonebook for devices on the internet. A phonebook is used to map a name (contact)…

Networking

8 min read

DNS: The What, Why and How Explained
DNS: The What, Why and How Explained
Networking

8 min read

David Varghese

David Varghese

156 Followers

Cyber Security Professional in the making blog.davidvarghese.dev

Following
  • Sara V

    Sara V

  • Ahmed Tarek

    Ahmed Tarek

  • Renuka Gavrani

    Renuka Gavrani

  • Kay Jan Wong

    Kay Jan Wong

  • Denisse Landau

    Denisse Landau

See all (23)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams