CTF collection Vol.2
Sharpening up your CTF skill with the collection. The second volume is about web-based CTF
Security Linux nmap Burp Suite Web Reverse Shell Privilege escalationSharpening up your CTF skill with the collection. The second volume is about web-based CTF
Security Linux nmap Burp Suite Web Reverse Shell Privilege escalationWork your way through the machine and try to find all the flags you can!
Security Linux nmap Burp Suite Web Reverse Shell Privilege escalationHack into a vulnerable database server that collects and stores data in JSON-based document formats, in this semi-guided challenge.
Security Linux Burp Cyberchef hash gobuster WebChallenge showcasing a web app and simple privilege escalation. Can you find the glitch?
Security Linux wfuzz gobuster Burpsuite Web Nodejs Privilege escalationBoot-to-root originally designed for Securi-Tay 2020
Security Linux Web Javascript Privilege escalationAfter the previous breach, VulnNet Entertainment states it won’t happen again. Can you prove they’re wrong?
Security Linux Web Javascript Privilege escalationA windows machine has been hacked, its your job to go investigate this windows machine and find clues to what the hacker might have done.
Security Windows CMD FWJason in JavaScript everything is a terrible mistake.
Security Nodejs Deserialization webMeet the world’s most powerful hacker dog!
CVE Security Ollie ExploitLet’s find out what his agent is up to….
python steg rot13Buff is pretty straightforward: Use a public exploit against the Gym Management System, then get RCE. Do some port-forwarding, then use another exploit (buffer overflow against Cloudme Sync) to get Administrator access.
buffer overflow cve windows file upload cloudme syncA bind shellcode listens on a socket, waiting for a connection to be made to the server then executes arbitrary code, typically spawning shell for the connecting user. This post demonstrates a simple TCP bind shellcode that executes a shell.
slae assembly tcp bind shellcodeSharpening up your CTF skill with the collection. The second volume is about web-based CTF
Security Linux nmap Burp Suite Web Reverse Shell Privilege escalationWork your way through the machine and try to find all the flags you can!
Security Linux nmap Burp Suite Web Reverse Shell Privilege escalationHack into a vulnerable database server that collects and stores data in JSON-based document formats, in this semi-guided challenge.
Security Linux Burp Cyberchef hash gobuster WebChallenge showcasing a web app and simple privilege escalation. Can you find the glitch?
Security Linux wfuzz gobuster Burpsuite Web Nodejs Privilege escalationBoot-to-root originally designed for Securi-Tay 2020
Security Linux Web Javascript Privilege escalationAfter the previous breach, VulnNet Entertainment states it won’t happen again. Can you prove they’re wrong?
Security Linux Web Javascript Privilege escalationA windows machine has been hacked, its your job to go investigate this windows machine and find clues to what the hacker might have done.
Security Windows CMD FWJason in JavaScript everything is a terrible mistake.
Security Nodejs Deserialization webMeet the world’s most powerful hacker dog!
CVE Security Ollie ExploitLet’s find out what his agent is up to….
python steg rot13A bind shellcode listens on a socket, waiting for a connection to be made to the server then executes arbitrary code, typically spawning shell for the connecting user. This post demonstrates a simple TCP bind shellcode that executes a shell.
slae assembly tcp bind shellcodeBuff is pretty straightforward: Use a public exploit against the Gym Management System, then get RCE. Do some port-forwarding, then use another exploit (buffer overflow against Cloudme Sync) to get Administrator access.
buffer overflow cve windows file upload cloudme sync