Getting Started with Ethical Hacking -Practical Cyber Security: THM “Advent of Cyber” Writeup

Image taken from https://www.simplilearn.com/ice9/free_resources_article_thumb/Ethical_hacking_and_penetration_testing_guide.jpg
$6$ - represent that this password is hashed using SHA-512 algorithm
3GvJsNPG - Salt used to hash the password
ZrSFprHS13divBhlaKg1rYrYLJ7m1xsYRKxlLh0A1sUc/6SUd7UvekBOtSnSyBwk3vCDqBhrgxQpkdsNN6aYP1 - hashed value

Software Engineering Intern @WSO2 @CERN| GSoC Participant | Undergrad @UOM | Computer Science and Engineering

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

For Secure Cloud Computing, Get Control of Your Crypto Keys

Digital ID cards now only work with new certificates

{UPDATE} My Taco Shop - Fast Food Serving Challenge Hack Free Resources Generator

Advanced Authentication Flows with Identity Server

Quantum RNG: The Cornerstone of Security

Content Delivery Network (CDN)

{UPDATE} Gun Master 3: Zombie Slayer Hack Free Resources Generator

A Proposed Clubhouse Blueprint for Leveraging Privacy to Achieve Growth, Instead of Growing At…

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Kalana Wijethunga

Kalana Wijethunga

Software Engineering Intern @WSO2 @CERN| GSoC Participant | Undergrad @UOM | Computer Science and Engineering

More from Medium

Intigriti -1337up CTF — Warmup Encoder writeup

Lab: Username enumeration via different responses

Shibboleth WriteUp - HackTheBox

Nibbles HTB Writeup