Splunk BOTSv2 Dataset – TryHackMe Splunk 2 CTF Walkthrough
In this exercise, you assume the persona of Alice Bluebird, the analyst who successfully assisted Wayne Enterprises and was recommended to Grace Hoppy at Frothly (a beer company) to assist…
In this exercise, you assume the persona of Alice Bluebird, the analyst who successfully assisted Wayne Enterprises and was recommended to Grace Hoppy at Frothly (a beer company) to assist…
Retro is typical blackbox CTF. Initial nmap scan shows 2 open ports:
This box is quite similar to Brainstorm which i did previously. Initial scan shows 2 open tcp ports: 9999 and 10000
The purpose of this CTF is to reverse engineer a chat program and write a script that will exploit a Windows machine. It is a great example of buffer overflow,…
Enumeration – nmap
Hash functions are quite different from encryption. There is no key, and it’s meant to be impossible (or very difficult) to go from the output back to the input. More…
This site is committed to providing articles about cyber security. More posts coming soon…