[TRYHACKME] – Void Execution Challenge
A friendly walkthrough of a slick binary-exploitation challenge: custom shellcode without syscall, ASLR bypass via GOT, and why stack alignment...
A friendly walkthrough of a slick binary-exploitation challenge: custom shellcode without syscall, ASLR bypass via GOT, and why stack alignment...
Introduction In this room we compromise a small Flask app behind Gunicorn, pivot from a clever SSRF to local file...
🕵️♂️ Decrypting Cipher's Orders: Repeating-Key XOR Crack with Known Header 🧠 Introduction During a recent intel sweep, we intercepted a...
FIXIT Challenge: ADHD-Friendly Walkthrough for SOC-L2 Hopefuls Welcome to the FIXIT Splunk challenge! This is the final SOC Level 2...
WorldWAP CTF Walkthrough This walkthrough covers the complete exploitation of the WorldWAP machine, detailing each step from reconnaissance to privilege...
Introduction This write-up documents the exploitation lifecycle of the Dodge CTF machine, a complex challenge that emphasised the importance of...
Here’s a detailed walkthrough-style report for the challenge. You can add screenshots to the placeholders marked as . Walkthrough Report:...
Walkthrough Report Step 1: Initial Reconnaissance with Nmap Command Executed: nmap -T 5 -p- 10.10.24.135 Findings: The Nmap scan revealed...
Difficulty: Medium Time Estimate: 60 mins Introduction The Injectics challenge on TryHackMe involves exploiting a series of vulnerabilities in a...
Initial Instructions Nmap GoBuster Check the results of the Nmap scan and Gobuster. In this case, the results show a...
GhostCat Firstly we use "nmap" to do a port scan. nmap port scan Exploit After a while, I stumbled across...
We start by running nmap nmap -v -sC -sV IP-ADDRESS-HERE -oA pickle-rick-scan When this is completed you will notice port...
We start off by running Nmap against the server nmap -v -sC -sV 10.10.131.182 -oA wonderland-10.10.131.182 Nmap scan of the...