DEV Community

Lupe Canaviri Maydana
Lupe Canaviri Maydana

Posted on

I discovered that emojis can have hidden messages 😉

😉️︎️︎︎️︎︎️︎︎️︎︎︎︎︎︎️️️︎︎️️︎️️︎︎️︎️︎️️︎︎️︎️︎︎️︎︎︎︎︎︎️️️️︎︎️︎️️︎️️️️︎️️️︎️︎️︎︎️︎︎︎︎︎︎️️︎︎︎︎️︎️️️︎︎️︎︎️️︎︎️︎️︎︎️︎︎︎︎︎︎️️︎︎︎️️︎️️️︎️︎️︎️️️︎︎️︎︎️️︎️︎︎️︎️️︎️️️️︎️️️︎️︎️︎️️️︎︎️️︎︎️︎︎︎︎︎︎️️︎︎️︎️︎️️︎️️️︎︎️️︎️️️️︎️️️︎️︎️︎️️︎︎️️️︎️️︎️︎︎︎︎︎️︎︎︎︎︎︎️️️︎️︎︎︎️️︎️️️️︎︎️︎︎︎︎︎︎️️︎︎️︎︎︎️️︎️︎︎️︎️️️︎︎️️︎️️︎︎︎️️︎️️︎️️️️︎️️️︎️️︎︎️️︎︎️︎️︎️️️︎︎️︎︎︎️︎︎︎︎︎︎️️️︎️︎︎︎️️︎️︎︎︎︎️️︎️︎︎️︎️️️︎︎️️︎︎️︎︎︎︎︎︎️️︎️︎︎︎︎️️︎️︎︎️︎️️︎︎️︎︎︎️️︎︎️︎︎︎️️︎︎️︎️︎️️︎️️️︎︎︎️︎︎︎︎︎︎️️︎️️︎️︎️️︎︎️︎️︎️️️︎︎️️︎️️️︎︎️️︎️️︎︎︎︎️︎️️︎︎️️️︎️️︎︎️︎️︎︎️︎️️︎︎︎︎️︎︎︎︎︎︎️︎︎️︎︎️︎︎️︎︎︎︎︎︎️️︎︎︎︎️︎️️︎️️︎️︎︎️︎︎︎︎︎︎️️️︎︎️️︎️️︎️︎︎︎︎️️︎︎︎︎️︎️️️︎︎️︎︎️️︎️︎︎️︎️️︎️️️︎︎️️︎︎️️️︎︎️︎︎︎︎︎︎️️︎️️︎️︎️️️️︎︎️︎︎️︎︎︎︎︎︎️️️︎︎︎︎︎️️️︎︎️︎︎️️︎️️️️︎️️︎︎️️️︎️️️︎︎️︎︎️️︎︎️︎️︎️️️︎︎️️︎️️️︎︎️️︎︎️︎︎︎︎︎︎️️︎️️️️︎️️︎️️️︎︎︎️︎︎︎︎︎︎️︎︎︎︎︎︎︎️︎︎︎️︎︎︎️️︎︎️︎️︎️️️︎️️︎︎️︎️︎︎️︎︎️️︎︎️︎️︎️️︎️️︎︎︎️︎️︎️︎️︎️️︎️️️︎︎️️︎️︎︎️︎︎️︎︎︎︎︎︎️️︎︎︎︎️︎️️︎️️️︎︎️️︎︎️︎︎︎︎️︎︎︎︎︎︎️️︎️︎︎︎︎️️︎️️️️︎️️️︎︎︎︎︎️️︎︎️︎️︎︎️︎︎︎︎︎︎️️️︎️️️︎️️︎︎️︎️︎︎️︎︎︎︎︎︎️️️︎️️️︎️️︎️︎︎️︎️️︎️️︎︎︎️️︎️️︎︎︎︎️︎︎︎︎︎︎️️︎︎︎️️︎️️️︎︎️︎︎️️︎︎️︎️︎️️︎︎︎︎️︎️️️︎️︎︎︎️️︎︎️︎️︎︎️︎︎︎︎︎︎️️︎︎︎︎️︎️️︎️️︎️︎️️︎︎︎︎️︎️️️️︎️︎︎️️︎️︎︎️︎️️︎️️️︎︎️️︎︎️️️︎︎️︎︎︎︎︎︎️️️︎️︎︎︎️️︎️︎︎︎︎️️︎️︎︎️︎️️︎️️️︎︎️️︎︎️️️︎️️️︎︎️️︎︎️︎︎︎︎︎︎️️️︎️︎︎︎️️︎️️️️︎️️︎︎️️️︎️️︎︎️︎️︎️️️︎️︎︎︎️️︎️︎︎︎︎️️︎︎️︎️︎️️️︎︎️︎︎︎️︎︎︎︎︎︎️️️︎️︎︎︎️️︎️︎︎︎︎️️︎︎️︎️︎︎️︎︎︎︎︎︎️️︎︎️️︎︎️️︎️️️️︎️️︎️️︎︎︎️️︎️️︎︎︎️️︎️️️️︎️️️︎️️️︎️️︎️︎︎️︎️️︎️️️︎︎️️︎︎️️️︎︎️︎︎︎︎︎︎︎️️︎︎️️︎︎️︎︎︎︎︎︎️️️︎️️️︎️️︎︎️︎️︎️️︎︎️︎️︎️️︎️︎️️︎️️️︎︎️️︎︎️︎︎︎︎︎︎︎️️️︎️︎︎️︎︎︎️︎︎​😉️︎️︎︎️︎︎️︎︎️︎︎︎︎︎︎️️️︎︎️️︎️️︎︎️︎️︎️️︎︎️︎️︎︎️︎︎︎︎︎︎️️️️︎︎️︎️️︎️️️️︎️️️︎️︎️︎︎️︎︎︎︎︎︎️️︎︎︎︎️︎️️️︎︎️︎︎️️︎︎️︎️︎︎️︎︎︎︎︎︎️️︎︎︎️️︎️️️︎️︎️︎️️️︎︎️︎︎️️︎️︎︎️︎️️︎️️️️︎️️️︎️︎️︎️️️︎︎️️︎︎️︎︎︎︎︎︎️️︎︎️︎️︎️️︎️️️︎︎️️︎️️️️︎️️️︎️︎️︎️️︎︎️️️︎️️︎️︎︎︎︎︎️︎︎︎︎︎︎️️️︎️︎︎︎️️︎️️️️︎︎️︎︎︎︎︎︎️️︎︎️︎︎︎️️︎️︎︎️︎️️️︎︎️️︎️️︎︎︎️️︎️️︎️️️️︎️️️︎️️︎︎️️︎︎️︎️︎️️️︎︎️︎︎︎️︎︎︎︎︎︎️️️︎️︎︎︎️️︎️︎︎︎︎️️︎️︎︎️︎️️️︎︎️️︎︎️︎︎︎︎︎︎️️︎️︎︎︎︎️️︎️︎︎️︎️️︎︎️︎︎︎️️︎︎️︎︎︎️️︎︎️︎️︎️️︎️️️︎︎︎️︎︎︎︎︎︎️️︎️️︎️︎️️︎︎️︎️︎️️️︎︎️️︎️️️︎︎️️︎️️︎︎︎︎️︎️️︎︎️️️︎️️︎︎️︎️︎︎️︎️️︎︎︎︎️︎︎︎︎︎︎️︎︎️︎︎️︎︎️︎︎︎︎︎︎️️︎︎︎︎️︎️️︎️️︎️︎︎️︎︎︎︎︎︎️️️︎︎️️︎️️︎️︎︎︎︎️️︎︎︎︎️︎️️️︎︎️︎︎️️︎️︎︎️︎️️︎️️️︎︎️️︎︎️️️︎︎️︎︎︎︎︎︎️️︎️️︎️︎️️️️︎︎️︎︎️︎︎︎︎︎︎️️️︎︎︎︎︎️️️︎︎️︎︎️️︎️️️️︎️️︎︎️️️︎️️️︎︎️︎︎️️︎︎️︎️︎️️️︎︎️️︎️️️︎︎️️︎︎️︎︎︎︎︎︎️️︎️️️️︎️️︎️️️︎︎︎️︎︎︎︎︎︎️︎︎︎︎︎︎︎️︎︎︎️︎︎︎️️︎︎️︎️︎️️️︎️️︎︎️︎️︎︎️︎︎️️︎︎️︎️︎️️︎️️︎︎︎️︎️︎️︎️︎️️︎️️️︎︎️️︎️︎︎️︎︎️︎︎︎︎︎︎️️︎︎︎︎️︎️️︎️️️︎︎️️︎︎️︎︎︎︎️︎︎︎︎︎︎️️︎️︎︎︎︎️️︎️️️️︎️️️︎︎︎︎︎️️︎︎️︎️︎︎️︎︎︎︎︎︎️️️︎️️️︎️️︎︎️︎️︎︎️︎︎︎︎︎︎️️️︎️️️︎️️︎️︎︎️︎️️︎️️︎︎︎️️︎️️︎︎︎︎️︎︎︎︎︎︎️️︎︎︎️️︎️️️︎︎️︎︎️️︎︎️︎️︎️️︎︎︎︎️︎️️️︎️︎︎︎️️︎︎️︎️︎︎️︎︎︎︎︎︎️️︎︎︎︎️︎️️︎️️︎️︎️️︎︎︎︎️︎️️️️︎️︎︎️️︎️︎︎️︎️️︎️️️︎︎️️︎︎️️️︎︎️︎︎︎︎︎︎️️️︎️︎︎︎️️︎️︎︎︎︎️️︎️︎︎️︎️️︎️️️︎︎️️︎︎️️️︎️️️︎︎️️︎︎️︎︎︎︎︎︎️️️︎️︎︎︎️️︎️️️️︎️️︎︎️️️︎️️︎︎️︎️︎️️️︎️︎︎︎️️︎️︎︎︎︎️️︎︎️︎️︎️️️︎︎️︎︎︎️︎︎︎︎︎︎️️️︎️︎︎︎️️︎️︎︎︎︎️️︎︎️︎️︎︎️︎︎︎︎︎︎️️︎︎️️︎︎️️︎️️️️︎️️︎️️︎︎︎️️︎️️︎︎︎️️︎️️️️︎️️️︎️️️︎️️︎️︎︎️︎️️︎️️️︎︎️️︎︎️️️︎︎️︎︎︎︎︎︎︎️️︎︎️️︎︎️︎︎︎︎︎︎️️️︎️️️︎️️︎︎️︎️︎️️︎︎️︎️︎️️︎️︎️️︎️️️︎︎️️︎︎️︎︎︎︎︎︎︎️️️︎️︎︎️︎︎︎️︎︎​😉️︎️︎︎️︎︎️︎︎️︎︎︎︎︎︎️️️︎︎️️︎️️︎︎️︎️︎️️︎︎️︎️︎︎️︎︎︎︎︎︎️️️️︎︎️︎️️︎️️️️︎️️️︎️︎️︎︎️︎︎︎︎︎︎️️︎︎︎︎️︎️️️︎︎️︎︎️️︎︎️︎️︎︎️︎︎︎︎︎︎️️︎︎︎️️︎️️️︎️︎️︎️️️︎︎️︎︎️️︎️︎︎️︎️️︎️️️️︎️️️︎️︎️︎️️️︎︎️️︎︎️︎︎︎︎︎︎️️︎︎️︎️︎️️︎️️️︎︎️️︎️️️️︎️️️︎️︎️︎️️︎︎️️️︎️️︎️︎︎︎︎︎️︎︎︎︎︎︎️️️︎️︎︎︎️️︎️️️️︎︎️︎︎︎︎︎︎️️︎︎️︎︎︎️️︎️︎︎️︎️️️︎︎️️︎️️︎︎︎️️︎️️︎️️️️︎️️️︎️️︎︎️️︎︎️︎️︎️️️︎︎️︎︎︎️︎︎︎︎︎︎️️️︎️︎︎︎️️︎️︎︎︎︎️️︎️︎︎️︎️️️︎︎️️︎︎️︎︎︎︎︎︎️️︎️︎︎︎︎️️︎️︎︎️︎️️︎︎️︎︎︎️️︎︎️︎︎︎️️︎︎️︎️︎️️︎️️️︎︎︎️︎︎︎︎︎︎️️︎️️︎️︎️️︎︎️︎️︎️️️︎︎️️︎️️️︎︎️️︎️️︎︎︎︎️︎️️︎︎️️️︎️️︎︎️︎️︎︎️︎️️︎︎︎︎️︎︎︎︎︎︎️︎︎️︎︎️︎︎️︎︎︎︎︎︎️️︎︎︎︎️︎️️︎️️︎️︎︎️︎︎︎︎︎︎️️️︎︎️️︎️️︎️︎︎︎︎️️︎︎︎︎️︎️️️︎︎️︎︎️️︎️︎︎️︎️️︎️️️︎︎️️︎︎️️️︎︎️︎︎︎︎︎︎️️︎️️︎️︎️️️️︎︎️︎︎️︎︎︎︎︎︎️️️︎︎︎︎︎️️️︎︎️︎︎️️︎️️️️︎️️︎︎️️️︎️️️︎︎️︎︎️️︎︎️︎️︎️️️︎︎️️︎️️️︎︎️️︎︎️︎︎︎︎︎︎️️︎️️️️︎️️︎️️️︎︎︎️︎︎︎︎︎︎️︎︎︎︎︎︎︎️︎︎︎️︎︎︎️️︎︎️︎️︎️️️︎️️︎︎️︎️︎︎️︎︎️️︎︎️︎️︎️️︎️️︎︎︎️︎️︎️︎️︎️️︎️️️︎︎️️︎️︎︎️︎︎️︎︎︎︎︎︎️️︎︎︎︎️︎️️︎️️️︎︎️️︎︎️︎︎︎︎️︎︎︎︎︎︎️️︎️︎︎︎︎️️︎️️️️︎️️️︎︎︎︎︎️️︎︎️︎️︎︎️︎︎︎︎︎︎️️️︎️️️︎️️︎︎️︎️︎︎️︎︎︎︎︎︎️️️︎️️️︎️️︎️︎︎️︎️️︎️️︎︎︎️️︎️️︎︎︎︎️︎︎︎︎︎︎️️︎︎︎️️︎️️️︎︎️︎︎️️︎︎️︎️︎️️︎︎︎︎️︎️️️︎️︎︎︎️️︎︎️︎️︎︎️︎︎︎︎︎︎️️︎︎︎︎️︎️️︎️️︎️︎️️︎︎︎︎️︎️️️️︎️︎︎️️︎️︎︎️︎️️︎️️️︎︎️️︎︎️️️︎︎️︎︎︎︎︎︎️️️︎️︎︎︎️️︎️︎︎︎︎️️︎️︎︎️︎️️︎️️️︎︎️️︎︎️️️︎️️️︎︎️️︎︎️︎︎︎︎︎︎️️️︎️︎︎︎️️︎️️️️︎️️︎︎️️️︎️️︎︎️︎️︎️️️︎️︎︎︎️️︎️︎︎︎︎️️︎︎️︎️︎️️️︎︎️︎︎︎️︎︎︎︎︎︎️️️︎️︎︎︎️️︎️︎︎︎︎️️︎︎️︎️︎︎️︎︎︎︎︎︎️️︎︎️️︎︎️️︎️️️️︎️️︎️️︎︎︎️️︎️️︎︎︎️️︎️️️️︎️️️︎️️️︎️️︎️︎︎️︎️️︎️️️︎︎️️︎︎️️️︎︎️︎︎︎︎︎︎︎️️︎︎️️︎︎️︎︎︎︎︎︎️️️︎️️️︎️️︎︎️︎️︎️️︎︎️︎️︎️️︎️︎️️︎️️️︎︎️️︎︎️︎︎︎︎︎︎︎️️️︎️︎︎️︎︎︎️︎︎​

This week, my learning journey took a massive leap into the world of cybersecurity, bridging the gap between traditional penetration testing and the bleeding edge of AI hacking. If you are curious about how systems are compromised, how to defend them, and what happens when artificial intelligence is involved, here is a breakdown of everything I've explored.

The AI Hacking Frontier

Hacking is evolving, and AI is the new battleground. The roadmap for AI hacking is fascinating and split into different skill tiers:

  • Entry Level: A great way to get started is through platforms and CTFs (Capture The Flag) like Gandalf Lakera AI, Agent Braker, and Auto Part CTF.
  • Elite Hackers: This is where things get wild. Advanced techniques like Emoji Steganography and Parseltongue (a mind-bending payload framework) are redefining how we interact with and exploit AI models. Discovering how emojis can hide malicious intent was an absolute "wow" moment for me!

The Anatomy of a Vulnerability

To understand security, you have to speak the language of vulnerabilities. The industry uses several standardized frameworks:

  • CVE (Common Vulnerabilities and Exposures): The unique identifier for a specific vulnerability.
  • CWE (Common Weakness Enumeration): The type of vulnerability (e.g., XSS - Cross-Site Scripting).
  • CAPEC: The specific attack pattern related to the vulnerability.
  • CVSS: A calculator to determine just how critical a vulnerability is.

The Lifecycle of an Exploit: The EternalBlue Story
Vulnerabilities don't just appear; they have a lifecycle. A perfect example is the infamous EternalBlue exploit:

  1. 2013: The NSA creates the exploit.
  2. Jan 2017: CERT warns Microsoft about the vulnerability.
  3. Mar 2017: Microsoft releases a security patch.
  4. Apr 2017: Hackers publicly release the exploit.
  5. May 2017: The WannaCry ransomware worm is released, spreading rapidly across networks. It infected over 200,000 machines in more than 200 countries, demanding $300 in Bitcoin from victims.

Penetration Testing 101

Pentesting is a structured approach to finding these vulnerabilities before the bad actors do.

1. Intelligence Gathering

Before attacking, a pentester maps the target.

  • Passive: Gathering public info from the internet without touching the target.
  • Semi-passive: Gathering public info by subtly interacting with target services.
  • Active: Directly engaging with the organization or its employees.

2. Vulnerability Scanning

Once the target is mapped, scanners help identify weak points.

  • Web Scanners: Acunetix, Burpsuite Pro, WPScan (for WordPress), Wapiti, and Nikto.
  • Network Scanners: Nmap (using its Scripting Engine), Nessus, and OpenVAS.

3. Attack Vectors & Exploitation

Exploitation can take many forms. It could be a technological vulnerability (like an old WinRAR bug), a brute force attack, or physical access (walking into a server room because no one asked for an ID). Social engineering is also massive here.

As Kevin Mitnick, one of the most famous hackers in the world, noted after transitioning to ethical hacking: "Yes, I am a hacker, but I do it with authorization. Now it's with my company to monitor corporate security controls. Before, I did it for free, and it brought me a lot of problems."

4. Post-Exploitation

Once inside, the job isn't over. Post-exploitation involves scaling privileges, assessing the full scope of the threat, extracting info, and finally, developing a comprehensive report detailing the criticality, the solution, and the timeline to fix it.

Advanced Attack Concepts: Fuzzing & Spoofing

  • Fuzzing: This is an automated process used to uncover hidden endpoints or vulnerabilities in applications. Tools like Gobuster, Dirbuster, wfuzz, and Spike are incredibly effective at this.
  • Spoofing: This involves identity theft or creating fake access points. It completely changed my perspective on airport networks—never blindly connect to free public Wi-Fi!

Where to Practice and Learn

You can't learn cybersecurity just by reading; you have to get your hands dirty.

Essential Tools:

  • VirusTotal & Talos: For checking file and site reputation.
  • Have I Been Pwned: To check if your credentials have been leaked.
  • ExpandURL & PhishTank: To unmask shortened URLs and verify phishing attempts.
  • OSINT Framework: For open-source intelligence gathering.

Practice Platforms:
For beginners, TryHackMe is incredible. The "Complete Beginner" and "Intro to Cyber Security" learning paths give you the perfect foundation in Linux, network security, and privilege escalation.

Other great platforms for sharpening your skills include HackTheBox (HTB), HackMyVM, and ine. If you are looking to monetize your skills, Bug Bounty platforms like HackerOne or Zerodium (for Zero-Day exploits) are where ethical hackers get paid to find bugs.

Have you tried any of these TryHackMe rooms or explored AI hacking yet? Let me know in the comments!

Top comments (0)