
Scan Surprise | PicoCTF 2024
I got this photo after unziping the file and I scanned this photo : And I got the flag
I got this photo after unziping the file and I scanned this photo : And I got the flag
Introduction Topic – Forensics | | | 50 points This challenge requires combining various skills such as grep, googling, and executing a script. In this post, I will share my…
Introduction In this walkthrough, I’ll explain how I successfully rooted the machine by exploiting the recently published EvilCUPS vulnerabilities (CVE-2024–47176, CVE-2024–47076, CVE-2024–47175, and CVE-2024–47177). After obtaining a reverse shell, I…
Introduction Reel is another Active Directory box on HTB. Without much information about Reel, let’s go in blind and see if it’s possible to obtain Administrator access. There are no…
Introduction In this post, You will learn how to CTF SolarLab from HTB and if you have any doubts comment down below 👇🏾 Let’s Begin Hey you ❤️ Please check…
Introduction In this post, You will learn how to CTF Return from HTB and if you have any doubts comment down below 👇🏾 Let’s Begin Hey you ❤️ Please check…