PicoCTF - trickster
This is a challenge from picoCTF titled 'trickster' from web exploitation category. It's needless to say that this one is a little trickier as the name
1337 or Elite, The Cybersecurity write-ups for the true cyber e1ite! Offsec, Hack The Box, and more🕵️‍♂️ Whether you're diving into the latest exploits or sharpening your skills 🛠️.
This is a challenge from picoCTF titled 'trickster' from web exploitation category. It's needless to say that this one is a little trickier as the name
Continuing from my OffSec TH-200 journey… In cybersecurity, ransomware remains one of the most dangerous threats facing organizations today. Ransomware attacks have evolved over the years, and attackers have become
As I continue my journey through the OffSec TH-200 course, I’ve now reached Module 2, Section 1, which delves into some critical areas of cybersecurity: threat actors, ransomware groups,
As cybersecurity threats evolve and become increasingly sophisticated, organizations must adopt proactive measures to safeguard their networks. I’ve recently started the new OffSec TH-200 course, and I could finish
In this task, we will try to hack into a Linux system. You can find the task here In this task on TryHackMe, the objective was to simulate a real-world
This is a challenge from picogym called Shark on Wire 1. The name suggests it's related to Wireshark. You can find the challenge here The challenge gave us
This challenge, titled 'SOAP,' from the web exploitation category on picoCTF, appears to center around an XXE (XML External Entity) vulnerability, as suggested by the associated tags. Upon
Congratulations on your purchase of the RogueWave Kali Pitail Accessory, the ultimate tool for every digital rogue and pentester on the move. Debuted and highlighted at Defcon 2024 as part
Onboarding Connection Info Proctoring Portal 570362 [HASH_REDACTED] The following are your Exam VPN connection credentials: Username:Â OS-570362 Password:Â Ebkh3FAtZvW Control Panel My IP: [LAB_IP] Instructions Target IP: [LAB_
Upon launching the machine in the HTB, I was promptly provided with an IP address to begin my exploration. My first step was to ensure a stable connection by pinging
Recon #nmap nmap --top-ports 1000 -T4 [LAB_IP] --open -Pn -vvv PORT STATE SERVICE REASON 22/tcp open ssh syn-ack 80/tcp open http syn-ack 139/tcp open netbios-ssn syn-ack
This writeup covers walkthrough of another HTB "Starting Point" machines entitled as "Fawn". First let us navigate to Fawn machine challenge and download the VPN (.ovpn)
Youtube walkthrough Decoding and Cracking Flags from Pcap Files Challenge file The pcap contents show various TCP streams containing flags: The observed flag, picoCTF{[SHA256_REDACTED]}, seems to be encoded
Solving a CTF Challenge: Decoding the Secret Message In this blog post, I will walk you through the steps I took to solve a Capture the Flag (CTF) challenge, where
Upon spawning the machine, we got the ip address of the target machine. Let's run nmap to find the open ports using the following command - nmap -sV