Sign in

CyberSecurity Expert | Hacker | Trainer and mentor | CTF Player | Writeups writer

Hack into a Mr. Robot themed Windows machine. Use metasploit for initial access, utilise powershell for Windows privilege escalation enumeration and learn a new technique to get Administrator access.

Hello I’m Ayush Bagde aka Overide and Welcome Back to another writeup of TryHackMe machine which is “Steel Mountain”. …

Hey Guys Fourth Vulnerability which is File Upload.

This is the interface:


To trigger the vulnerability of File Upload we’ll have to create a payload. …

Hey Guys, Our Second Vulnerability is Command Injection on low level of Security. So Let’s Start.

So this is the interface:


Let firstly check the source code for low:

Hello I am ayush bagde aka Overide and in this writeup. I’m gonna start a series of DVWA virtual Lab.

Our First Vulnerability is Brute Force on low level of Security. So Let’s Start

So this is our interface of bruteforce:

So there are many tools for bruteforcing some CLI…

Learn how to use TShark to accelerate your pcap analysis!

Hey Guys, After a long time. Sorry for the delay. I actually took a break from writing writeups. Welcome to the new write-up of room TShark.

Room Link:

Let’s Begin,

TASK 1: Pre-Reqs

Why TShark?
Bored with trying to extract packets by hand…

Find out what happened by analysing a .pcap file and hack your way back into the machine

Hello Guys welcome back to Ayush Bagde aka Overide and in this writeup we’re gonna see the recently launched machine h4cked. Let’s Start.

TASK 1: Oh no! We’ve been hacked!

Firstly download the Task files. …

A revitalised, hands-on showcase involving analysing malicious macro’s, PDF’s and Memory forensics of a victim of Jigsaw Ransomware; all done using the Linux-based REMnux toolset apart of my Malware Analysis series

Hey Guys Welcome back to another writeup I’m Ayush Bagde aka Overide and in This writeup we’re gonna learn…

Manipulating DNS queries to our advantage


In this room, we will look into DNS and showcase the techniques used to exfiltrate and infiltrate data. First, we will look at what purposes DNS serves, how it works, and the types of DNS records.

The image below illustrates a basic DNS lookup. Here the client machine reaches out…

Investigating “strings” within an application and why these values are important!

Hey Guys, Welcome back to another writeup. In This writeup we’ll learn about MAL: Strings machine which is VIP machine not available for free users. I’m Ayush bagde aka Overide.

Here is the room Link: MAL: Strings

Let’s Start

TASK 1: What are “Strings”?

You are here amongst the Malware series:

3. MP: Strings


Join this room to learn about the first forms of malware and how they turned into the malicious code we see today.

Join the room from here.


This room is dedicated to the first types of malware. “Malware” consists of two words combined; malicious and software. Typically, Malware is…

Ayush Bagde

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store