Sending ICMP Packets with Python Socket: Adventure in Signaling

In this article, I demonstrate how to craft and send ICMP packets using Python raw sockets, covering packet structure, checksum calculation, and low-level network communication.

https://denizhalil.com/2024/04/06/sending-icmp-packets-with-python-socket-adventure-in-signaling/

#CyberSecurity #Python #ICMP #SocketProgramming #NetworkSecurity #PacketCrafting #RawSockets #InfoSec #EthicalHacking #NetworkProgramming #DenizHalil

New playlist online: from malware analysis to ethical hacking demos. Check it out here 👉 https://www.youtube.com/playlist?list=PLXqx05yil_mdDEmpJJ75qnJ2zgk4-iF7y
#Malware #EthicalHacking #CyberDefense #NetworkSecurity #IncidentResponse
260516 rootshell.online

YouTube
New playlist online: from malware analysis to ethical hacking demos. Check it out here 👉 https://www.youtube.com/playlist?list=PLXqx05yil_mcEXACI5SfcaCl3MAXPY53g
#Malware #EthicalHacking #CyberDefense #NetworkSecurity #IncidentResponse
260516 rootshell.online

YouTube

Comprehensive List of Top 10 Uses for #VPS Servers If you've ever wondered, "what are common use-cases for VPS servers?", you have come to the right place!

We have compiled a list of the top 10 uses for VPS servers, as observed by Rad Web Hosting staff, during the course of providing VPS hosting services since 2015.

It should be noted that this compilation is not ...
Continued 👉 https://blog.radwebhosting.com/top-10-uses-for-vps-servers/?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon.social #scalability #vpnhosting #ethicalhacking #backup #vpsservers #gameservers #cloudstorage

Current reverse engineering setup*:

1) llama-server built with MTP support (just now merged into main)
2) unsloth qwen 3.6 35b a3b UD_Q4_K_XL MTP
3) Opencode with Superpowers and DCP
4) pyghidra-mcp

This allows for reverse engineering using Ghidra by prompting the LLM to do the heavy lifting. It will rapidly go through Ghidra-analysed functions and rename all the common ones, draw up the whole callpath, identify interfaces between secure and nonsecure areas etc. It's a complete game changer since while it's not doing anything I can't do myself the speed at which it's done is absolutely staggering compared to the manual labour.

I go from not knowing anything about the fw/flash I'm working on to have it completely broken down to where I can start looking for exploits in mere hours.

And yeah, the LLM aids in looking for those as well. So far my input to what exploits to look for is needed, but I can well see there being fine-trained or fully trained exploit-LLMs that would have that completely automated as well.

*) This is all running on a modern workstation where ~20GB of system RAM is needed in addition to the 16GB VRAM 5060Ti.

#EthicalHacking

Latest cyber & hacking videos compiled for you twice a day. Watch now & stay ahead of threats. 🔒 https://www.youtube.com/playlist?list=PLXqx05yil_mea6j9WdXsH8EGUT8w4PM23
#CyberSecurity #InfoSec #CloudSecurity #Phishing #EthicalHacking
260515 rootshell.online

YouTube

OccupyTheWeb’s New Podcast #4

Tomorrow’s Subject:

«Has Ukraine Turned the Corner in this War With Russia and, if so, How Did They Do It?»

Hint: Drones, cybersecurity, and strategic thinking
#cybersecurity #drones #ethicalhacking #cyberwar

Hack smarter, defend stronger. Catch the newest daily videos curated for security pros and learners. 🎯 https://www.youtube.com/playlist?list=PLXqx05yil_me7d_E5DAL3TPbbLGvVHDrT
#CyberSecurity #ThreatIntelligence #EthicalHacking #DataSecurity #DarkWeb
260512 rootshell.online

YouTube
Owned Plug & Pray from Hack The Box!

I have just owned challenge Plug & Pray from Hack The Box

Owned Utterly Broken Shell from Hack The Box!

I have just owned challenge Utterly Broken Shell from Hack The Box