-
Program to convert a Character into ASCII value using C Language

In C language, The integer value for a character is always it’s ASCII value. So If you want to print an ASCII value of a character in C then simply use %d to get the character’s ASCII integer value. Code: #include<stdio.h> void main(){ int c; char d; printf(“\n\n*****************Program to output ASCII code for an input********************\n”);…
-
OVERTHEWIRE:BANDIT WALKTHROUGH SERIES 5-12 LEVELS

This article is continuation of the over the wire bandit series. In case you haven’t read that here it is OVERTHEWIRE:BANDIT WALKTHROUGH SERIES 1-5 LEVELS. So let’s start with the level 6. I logged in level 6 with the credentials I gained in level 5. > level 5-6 ssh bandit5@bandit.labs.overthewire.org -p 2220 password: Level 4-5 password…
-
Overthewire:Bandit walkthrough Series 1-5 Levels

The following post is a walkthrough for Overthewire bandit challenge.The bandit challenge of overthewire is based on linux commands. These challenges will guide you on how to deal with different files in a linux environment. Bandit contains 26 levels and this article is a series of 1 – 5 levels. > Level 0 -1:…
-
Diffie Hellman Key Exchange: What it is?

What is Diffie Hellman? It is an asymmetric key exchange algorithm which allows two parties to agree upon a shared secret key in such a way that no other person can eavesdrop on the communication. It uses two different keys for the exchanging purpose i.e, Public key and Private key. It is not an encrypting…
-
Caesar Cipher Program in C
What is Caesar Cipher? Caesar Cipher is a Symmetric Cryptography model, with the term Symmetric, I mean that that key which is used for both encryption and decryption are same. This is the earliest model which is used by Julius Caesar. It involves replacement of the current character with the third places further down.It uses…
-
How to become a Hacker?

Hacker is a person who can gain unauthorized access to a device. Many people have this question in their mind, “How to become one?”. Before I give answer to this question, I would like to explain the concept of everything related to hacking. Hacking is a vast field, it consist of topics not just limited…
-
The Art Of Getting Everything!
It’s intriguing isn’t it? You can get any resource over the internet! I am writing this article because there is this thing I want to share with you people, i.e., You can get anything over the web and with anything I meant EVERYTHING. Now you might be saying is that some kind of joke isn’t…
-
Wireless Hacking (WPA/WPA2)
Wireless Hacking is a wide topic. It is a never ending topic and the more you will talk about it the more things you will know so wrapping up this vast topic in just one article wouldn’t be fair, So first we will be talking about WPA/WPA2 encrypted wireless hacking. Wi-Fi stands for Wireless Fidelity.…
-
Information Gathering(Reconnaissance/Footprinting)
This is the very first step for any kind of hacking(White,Grey,Black).Information Gathering as the name suggests, is gathering as much information about the target as possible.Hackers or Security Experts need to create a information database before attacking a target, it helps them to find out the technology a particular company or a simple website uses…




