Scan Surprise | PicoCTF 2024
I got this photo after unziping the file and I scanned this photo : And I got the flag
Scan Surprise | PicoCTF 2024 Read More »
I got this photo after unziping the file and I scanned this photo : And I got the flag
Scan Surprise | PicoCTF 2024 Read More »
Introduction Topic – Forensics | | | 50 points This challenge requires combining various skills such as grep, googling, and executing a script. In this post, I will share my thought process and the steps I took to solve the challenge. Note: I completed this challenge with limited prior knowledge of the skills involved. On
Verify | Pico CTF 2024 Read More »
Introduction In this walkthrough, I’ll explain how I successfully rooted the machine by exploiting the recently published EvilCUPS vulnerabilities (CVE-2024–47176, CVE-2024–47076, CVE-2024–47175, and CVE-2024–47177). After obtaining a reverse shell, I discovered a print job containing the root password, leading to system access. Along the way, I’ll reference useful sources, and I highly recommend exploring them.
Evilcups Writeup | HTB Read More »
Introduction Reel is another Active Directory box on HTB. Without much information about Reel, let’s go in blind and see if it’s possible to obtain Administrator access. There are no guided questions for Reel. Let’s Begin Hey you ❤️ Please check out my other posts, You will be amazed and support me by following on
Reel HTB Walkthrough | HacktheBox Read More »
Introduction In this post, You will learn how to CTF SolarLab from HTB and if you have any doubts comment down below 👇🏾 Let’s Begin Hey you ❤️ Please check out my other posts, You will be amazed and support me by following on X. Let’s Hack SolarLab HTB 😌 https://twitter.com/HacklikeHacker SolarLab HTB Enumeration As
SolarLab HTB Writeup | HacktheBox Read More »
Introduction In this post, You will learn how to CTF Return from HTB and if you have any doubts comment down below 👇🏾 Let’s Begin Hey you ❤️ Please check out my other posts, You will be amazed and support me by following on X. Let’s Hack Return HTB 😌 https://twitter.com/HacklikeHacker Enumeration To start off,
Return HTB Writeup | HacktheBox Read More »
Introduction In this post, You will learn how to CTF driver from HTB and if you have any doubts comment down below 👇🏾 Let’s Begin Hey you ❤️ Please check out my other posts, You will be amazed and support me by following on X. Let’s Hack Perfection HTB 😌 https://twitter.com/HacklikeHacker User I began by
Driver HTB Writeup | HacktheBox Read More »
Introduction In this post, You will learn how to CTF Usage from HTB and if you have any doubts comment down below 👇🏾 Let’s Begin Hey you ❤️ Please check out my other posts, You will be amazed and support me by following on X. Let’s Hack Usage from HTB 😌 https://twitter.com/HacklikeHacker Rust Scan rustscan
Usage HTB Writeup | HacktheBox Read More »
Introduction In this post, You will learn how to CTF headless from HTB and if you have any doubts comment down below 👇🏾 Let’s Begin Hey you ❤️ Please check out my other posts, You will be amazed and support me by following on X. Let’s Hack Perfection HTB 😌 https://twitter.com/HacklikeHacker Nmap Scan I began
Headless HTB Writeup | HackTheBox Read More »
Introduction This blog talks about how to solve the GET aHEAD challenge, which is one of the tasks in the picoCTF Web Exploitation section. Solution Here’s what you need to do: There’s a flag hidden on a server. You can access it through this link: http://mercury.picoctf.net:21939/ Just open the link in your web browser and
GET aHEAD Pico CTF Writeup Read More »