Time to enter the warren… Room link Task 1 What is the user flag? Recon Scanning the machine, we see that FTP, SSH and HTTP are running. nmap -sSCV 10.10.19.5 -v Checking for a website, we...
Just a few hours before “cd year-2023” or “sudo apt install year-2023” if you’d prefer, I participated in an awesome CTF competition organized by UDOM CYBER CLUB. I solved a few challenges ranging...
You are involved in an incident response engagement and need to analyze an infected host using Redline. Room link here Difficulty: Medium Investigating the Compromised Endpoint Open Redline Too...
A ctf for beginners, can you root me? Room link here Task 1 — Deploy the machine Task 2 — Reconnaissance 1. Scan the machine, how many ports are open? Let’s do a simple nmap scan. sudo nmap...
pdfkit-Exploit-Reverse-Shell All < 0.8.6 versions of this package are vulnerable to Command Injection where the URL is not properly sanitized. Severity Critical 9.8/10 Note This issue ...
A short write up for some ctf challenges held at KCA University during the intervarsity bootcamp by SheHacksKE, fr334aks, Safaricom, AfricaHackOn, Ekraal Innovation Hub, Trend Micro, Microsoft. Ch...
Let’s take a look at some ctf challenges from the bootcamp. Bootcamp Link Challenge 1: mask(Network Security Fundamentals) challenge link What is the subnet mask for this host? flag format: x...
A new version of content is available.