Scan Surprise | PicoCTF 2024
I got this photo after unziping the file and I scanned this photo : And I got the flag
I got this photo after unziping the file and I scanned this photo : And I got the flag
Introduction Topic – Forensics | | | 50 points This challenge requires combining various skills such as grep, googling, and executing a script. In this post, I will share my…
Introduction In today’s rapidly advancing digital age, cybersecurity and open-source intelligence (OSINT) are critical fields that rely on actionable data to address threats and vulnerabilities. Among these data points, phone…
Introduction Vending machines are everywhere — from office buildings to shopping malls. But did you know these snack dispensers are often IoT-enabled devices, and if poorly secured, they can become…
Introduction In the world of cybersecurity, network scanning tools are essential for uncovering vulnerabilities and gaining insights into systems. Among these tools, Rustscan has emerged as a standout performer, rapidly…
Introduction Feroxbuster is a powerful and versatile tool that helps uncover hidden directories and files on web servers through brute-force scanning. Widely used in penetration testing and security assessments, it…
Introduction In this walkthrough, I’ll explain how I successfully rooted the machine by exploiting the recently published EvilCUPS vulnerabilities (CVE-2024–47176, CVE-2024–47076, CVE-2024–47175, and CVE-2024–47177). After obtaining a reverse shell, I…
Introduction Reel is another Active Directory box on HTB. Without much information about Reel, let’s go in blind and see if it’s possible to obtain Administrator access. There are no…
Introduction If you’re into web development or tech, you’ve probably encountered terms like localhost and 127.0.0.1. But have you ever stopped to think about their roles in local development? This…