I got this photo after unziping the file and I scanned this photo : And I got the flag
Author - moulik
Table of ContentsIntroductionLet's Start ConclusionFAQs Introduction Topic – Forensics | | | 50 points This challenge requires combining various skills such as grep, googling, and executing a script. In...
Table of ContentsIntroductionLet's Start ConclusionFAQs Introduction In today’s rapidly advancing digital age, cybersecurity and open-source intelligence (OSINT) are critical fields that rely on actionable data to...
Table of ContentsIntroductionLet's Start ConclusionFAQs Introduction Vending machines are everywhere — from office buildings to shopping malls. But did you know these snack dispensers are often IoT-enabled...
Table of ContentsIntroductionLet's Start ConclusionFAQs Introduction In the world of cybersecurity, network scanning tools are essential for uncovering vulnerabilities and gaining insights into systems. Among these...
Table of ContentsIntroductionLet's Start ConclusionFAQs Introduction Feroxbuster is a powerful and versatile tool that helps uncover hidden directories and files on web servers through brute-force scanning. Widely...
Introduction In this walkthrough, I’ll explain how I successfully rooted the machine by exploiting the recently published EvilCUPS vulnerabilities (CVE-2024–47176, CVE-2024–47076, CVE-2024–47175, and CVE-2024–47177)...
Table of ContentsIntroductionLet's Start ConclusionFAQs Introduction Reel is another Active Directory box on HTB. Without much information about Reel, let’s go in blind and see if it’s possible to obtain...
Table of ContentsIntroductionLet's Start ConclusionFAQs Introduction If you’re into web development or tech, you’ve probably encountered terms like localhost and 127.0.0.1. But have you ever stopped to think...