CTF collection Vol.2
Sharpening up your CTF skill with the collection. The second volume is about web-based CTF
Sharpening up your CTF skill with the collection. The second volume is about web-based CTF
Work your way through the machine and try to find all the flags you can!
Hack into a vulnerable database server that collects and stores data in JSON-based document formats, in this semi-guided challenge.
Challenge showcasing a web app and simple privilege escalation. Can you find the glitch?
Boot-to-root originally designed for Securi-Tay 2020
After the previous breach, VulnNet Entertainment states it won’t happen again. Can you prove they’re wrong?
A windows machine has been hacked, its your job to go investigate this windows machine and find clues to what the hacker might have done.
Jason in JavaScript everything is a terrible mistake.
Meet the world’s most powerful hacker dog!
Let’s find out what his agent is up to….
Buff is pretty straightforward: Use a public exploit against the Gym Management System, then get RCE. Do some port-forwarding, then use another exploit (buffer overflow against Cloudme Sync) to get Administrator access.
A bind shellcode listens on a socket, waiting for a connection to be made to the server then executes arbitrary code, typically spawning shell for the connecting user. This post demonstrates a simple TCP bind shellcode that executes a shell.
slae assembly tcp bind shellcodeSharpening up your CTF skill with the collection. The second volume is about web-based CTF
Work your way through the machine and try to find all the flags you can!
Hack into a vulnerable database server that collects and stores data in JSON-based document formats, in this semi-guided challenge.
Challenge showcasing a web app and simple privilege escalation. Can you find the glitch?
Boot-to-root originally designed for Securi-Tay 2020
After the previous breach, VulnNet Entertainment states it won’t happen again. Can you prove they’re wrong?
A windows machine has been hacked, its your job to go investigate this windows machine and find clues to what the hacker might have done.
Jason in JavaScript everything is a terrible mistake.
Meet the world’s most powerful hacker dog!
Let’s find out what his agent is up to….
A bind shellcode listens on a socket, waiting for a connection to be made to the server then executes arbitrary code, typically spawning shell for the connecting user. This post demonstrates a simple TCP bind shellcode that executes a shell.
slae assembly tcp bind shellcodeBuff is pretty straightforward: Use a public exploit against the Gym Management System, then get RCE. Do some port-forwarding, then use another exploit (buffer overflow against Cloudme Sync) to get Administrator access.