Chioma IbeakanmaforChioma Ibeakanma's blogchiomaibeakanma.hashnode.net·Jul 7, 2022JANGOW: 1.0.1 Walkthrough | VulnhubJangow is a box on Vulnhub that is centered on enumeration. Enumeration is a very important step in penetration testing. Enumeration is a process in pentesting where you establish an active connection with the victim and try to discover as many attac...Discuss·15 likes·1.1K readsVulnhub Walkthroughs with Chioma IbeakanmaCTF
Nouman RahmanforProgrammingFireprogrammingfire.hashnode.net·Oct 14, 2022picoCTF 2022: Binary Exploitation: basic-file-exploitIntroduction Challenge: basic-file-exploit Category: Binary Exploitation Description: The program provided allows you to write to a file and read what you wrote from it. Try playing around with it and see if you can break it! Connect to the program ...Discuss·10 likes·494 readspicoCTF 2022picoCTF 2022
Nouman RahmanforProgrammingFireprogrammingfire.hashnode.net·Oct 14, 2022picoCTF 2022: Cryptography: basic-mod-2Introduction Challenge: basic-mod-2 Category: Cryptography Description: A new modular challenge! Download the message here. Take each number mod 41 and find the modular inverse for the result. Then map to the following character set: 1-26 are the al...Discuss·10 likes·433 readspicoCTF 2022Cryptography
Shua'ib OseniforShosenwales shosenwales.hashnode.net·Apr 15, 20235 Vulnerable applications to learn Web Application SecurityWeb application security is a critical aspect of modern-day technology, and it's essential for developers, security professionals, and anyone involved in building or maintaining web applications to understand the potential risks and vulnerabilities. ...DiscussWeb Development
ZeynforZeynzeyn.hashnode.net·Apr 3, 2023CTF - Mustacchio (THM)Énumération Port Scan Pour la partie scan des ports, j'utilise un tool que j'ai développé qui permet simplement d'effectuer un scan nmap plus rapidement. ┌──(root㉿kali)-[~/thm] └─# nmaped 10.10.0.139 Starting Nmap 7.93 ( https://nmap.org ) at 2023-0...DiscussCTF
shafouzforshafouz.hashnode.net·Mar 16, 2023hxp 2022 - archivedarchived chall: archived by sandr0 difficulty: easy description: I’m using this super secure big company open source software, what could go wrong? Two credentials are provided, admin and regular user. The challenge consists of a server and an a...Discuss·139 readsWrite Up
Nguyễn Cao Huy HoàngforAntoine Nguyễn's Blogantoinenguyen-09.hashnode.net·Mar 7, 2023The Art of Cross-origin resource sharing (CORS) in UIUCTF 2022TLDR: Trong quá trình pentest và làm report, nếu gặp các CWE liên quan đến CORS (cross-origin resource sharing) như CWE-942 thì y như rằng mình sẽ "vứt nó vào sọt rác" hoặc cùng lắm là PoC "cho có lệ": nhét header Origin: http://attacker.com vào requ...DiscussCTF
HodlToM00NforHodlToM00Nhodltom00n.hashnode.net·Mar 2, 2023GryphonCTF 2022: ret2secret WriteupGCTF or Gryphon CTF is a Capture-The-Flag event hosted by Cybersecurity students from Singapore Poly. This write-up provides a solution to solve one of the binary exploitation, a.k.a PWN challenges, titled ret2secret. Approach The challenge features ...Discuss·62 readsCTF
andhika pratama putraforandhika pratama putraandhikapratamap.hashnode.net·Feb 6, 2023Web ExploitPICO CTF WRITEUP LOGIN Web Exploit adalah suatu teknik untuk menghack atau menerobos masuk suatu website atau situs online menggunakan beberapa teknik. Hacking tanpa izin adalah ilegal. Situs ini sangat mendidik untuk mempelajari tentang keamanan du...Discuss·30 readsHackingCTF
Michael LohrforMichi's Blogmichidk.hashnode.net·Feb 4, 2023Hacking Google CTF - Episode 5This is a write-up about how I solved the sixth episode of the H4CK1NG GOOGL3 security CTF. If you didn't read my post about the first episode, I highly recommend you to check it out since it introduces the concept of a CTF. It took me quite a while ...Discuss·35 readsHacking Google CTFhacking
Ataf Fazledin AhamedforCTF Writeups by @fazledynfazledyn.hashnode.net·Jan 21, 2023Intra BUET Capture The Flag 2023 - Problem Setter Writeup 📝The problems for the CTF can be found here: https://github.com/buetsec/intra-buet-ctf-2023 or https://github.com/rng70/beginner-ctf-problemset Cryptography Fab-Five-Freddy Just MD5 hash the string 1stCSE@BUET and you get the flag buet{c517e8df662284b...Discuss·29 readsCTF
Tanya Goyalfortanyago.hashnode.net·Jan 12, 2023Agent Sudo | TryHackMe | CTFHello everyone. Here I am again with the new CTF. One thing I want to share with all of you. If you are using walkthroughs, that does not mean you are dumb or you don't know anything. I also use walkthroughs for CTF. I get to know new tools or new wa...Discuss·49 readsCTF
shafouzforshafouz.hashnode.net·Jan 11, 2023Solving pwnable's - orw - 2/???https://pwnable.tw The challenge description says: Only open read write syscalls are allowed to use. But is that enforced? How? Seccomp Taking a look using the ghidra decompiler: void orw_seccomp(void) { int iVar1; undefined4 *puVar2; undefined...Discuss·47 readsWrite Up