Table of ContentsIntroductionLet's Start Step 1Step 2Step 3Step 4Step 5Step 6Step 7 Introduction As a beginner, I understand the struggle of hunting bugs on websites and facing demotivation when nothing seems to click...
Blog
Table of ContentsIntroductionLet's Start Step 1Step 2Step 3Step 4Step 5Step 6Step 7 Introduction Hey there, In this post, let’s see what is gophish and who created the tool and also let’s see how to use this...
Table of ContentsIntroductionLet's Start Step 1Step 2Step 3Step 4Step 5Step 6Step 7 Introduction Surveillance HTB: In this post, Let’s see how to CTF the Surveillance htb and if you have any doubts comment down below...
Table of ContentsIntroductionLet's Start Step 1Step 2Step 3Step 4Step 5Step 6Step 7 Introduction Hello there, Welcome back in this post, let’s see how to CTF stonks from picoCTF. If you have any doubt, comment...
Table of ContentsIntroductionLet's Start Step 1Step 2Step 3Step 4Step 5Step 6Step 7 Introduction Question: There is a nice program that you can talk to by using this command in a shell: $ nc mercury.picoctf.net 49039...
Table of ContentsIntroductionLet's Start Step 1Step 2Step 3Step 4Step 5Step 6Step 7 Introduction PicoCTF’s Information challenge is fascinating because it prompts us to ponder the numerous methods available to...
Table of ContentsIntroductionLet's Start Step 1Step 2Step 3Step 4Step 5Step 6Step 7 Introduction Check out the complete walkthrough for all the Natas CTF challenges, ranging from 1 to 34. Note that as of July 5, 2020...
Table of ContentsIntroductionLet's Start Step 1Step 2Step 3Step 4Step 5Step 6Step 7 Introduction Question: Can you invoke help flags for a tool or binary? This program has extraordinarily helpful...
Table of ContentsIntroductionLet's Start Step 1Step 2Step 3Step 4Step 5Step 6Step 7 Introduction It seems like the Python script needs to be run similar to how you’d run a program in the Terminal. The goal is...