Light – Writeup
Light is an EASY machine from Try Hack Me platform. On this machine we will have to exploit a SQLi vulnerability of a SQLITE database in order to obtain usernames,…
Light is an EASY machine from Try Hack Me platform. On this machine we will have to exploit a SQLi vulnerability of a SQLITE database in order to obtain usernames,…
On this EASY machine of the Try Hack Me platform we will have to find some brute force credentials that will be used to access a file management service. We…
StuxCTF is a MEDIUM machine of the TryHackMe platform. In this machine we will have to discover some values in the source code of a web page, which we will…
Agent Sudo is an EASY machine of the Try Hack Me platform. On this machine we will have to manipulate the user-agent value to find a hidden message on the…
Date: 10/04/2022 Difficulty: Hard CTF: https://tryhackme.com/room/internal Scope of Work The client requests that an engineer conducts an external, web app, and internal assessment of the provided virtual environment. The client…
Date: 06/04/2022 Difficulty: Hard CTF: https://tryhackme.com/room/relevant You have been assigned to a client that wants a penetration test conducted on an environment due to be released to production in seven…
Date: 04/04/2022 Difficulty: Hard CTF: https://tryhackme.com/room/dailybugle Deploy Access the web server, who robbed the bank? First of all, a quick scan: Ping tell us that it will be a linux…
Date: 03/04/2022 Difficulty: Easy CTF: https://tryhackme.com/room/skynet A vulnerable Terminator themed Linux machine. What is Miles password for his emails? First things first, let’s to a quick scan: Ping received by…
Date: 02/04/2022 Difficulty: Medium CTF: https://tryhackme.com/room/gamezone This room will cover SQLi (exploiting this vulnerability manually and via SQLMap), cracking a users hashed password, using SSH tunnels to reveal a hidden…
Date: 01/04/2022 Difficulty: Medium CTF: https://tryhackme.com/room/hackpark Hacking Windows with Hydra, RCE & WinPEAS This room will cover brute-forcing an accounts credentials, handling public exploits, using the Metasploit framework and privilege…