Verify Picocft 2024

Verify | Pico CTF 2024

Table of ContentsIntroductionLet's Start ConclusionFAQs Introduction Topic – Forensics | | | 50 points This challenge requires combining various skills such as grep, googling, and executing a script. In...

Continue reading

Rustscan Network Mapping

RustScan Full Tutorial | Updated 2024

Table of ContentsIntroductionLet's Start ConclusionFAQs Introduction In the world of cybersecurity, network scanning tools are essential for uncovering vulnerabilities and gaining insights into systems. Among these...

Continue reading

Feroxbuster

Feroxbuster Full Tutorial | Noob to Pro

Table of ContentsIntroductionLet's Start ConclusionFAQs Introduction Feroxbuster is a powerful and versatile tool that helps uncover hidden directories and files on web servers through brute-force scanning. Widely...

Continue reading

EVILCUPS HTB

Evilcups Writeup | HTB

Introduction In this walkthrough, I’ll explain how I successfully rooted the machine by exploiting the recently published EvilCUPS vulnerabilities (CVE-2024–47176, CVE-2024–47076, CVE-2024–47175, and CVE-2024–47177)...

Continue reading

REEL HTB

Reel HTB Walkthrough | HacktheBox

Table of ContentsIntroductionLet's Start ConclusionFAQs Introduction Reel is another Active Directory box on HTB. Without much information about Reel, let’s go in blind and see if it’s possible to obtain...

Continue reading