BOTS SOC Open Systems Palo Alto Kaspersky zScaler

Boss of the SOC: Capture-the-Flag as a Recruitment Tool

Splunk's Boss of the SOC (BOTS) exercise helps cybersecurity pros show off skills and also serves as a valuable recruiting tool ...
Security Boulevard
What is a File Format?

PDF is Broken: a justCTF Challenge

| | Capture the Flag
Trail of Bits sponsored the recent justCTF competition, and our engineers helped craft several of the challenges, including D0cker, Go-fs, Pinata, Oracles, and 25519. In this post we’re going to cover another ...

Intel Hardware CTF Competitions Drive Innovation for Next-Gen Secure Computing Platforms

The concept of capture the flag competitions goes back hundreds of years from a military perspective, and it has become a staple of hacking and cybersecurity exercises. The basic concept pits teams ...
Typo 1: VulnHub CTF walkthrough (part 2)

Typo 1: VulnHub CTF walkthrough (part 2)

| | Capture the Flag
Introduction In the previous article, Part 1 of this CTF, we were able to complete the following steps on the victim machine: Getting the target machine IP address by running the VM ...

Typo 1: VulnHub CTF walkthrough (part 1)

| | Capture the Flag
In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named Akanksha Sachin Verma. As per the description given by ...

Source 1: VulnHub CTF walkthrough

| | Capture the Flag
In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named darkstar7471. Per the description given by the author, this ...

PWNED 1: VulnHub CTF walkthrough

| | Capture the Flag
In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named Ajs Walker. As per the description given by the ...
Hack the Box (HTB) machines walkthrough series — Cascade (part 2)

Hack the Box (HTB) machines walkthrough series — Cascade (part 2)

| | Capture the Flag
We’re continuing from Part 1 of this machine, where we carried out a lot of enumeration and decoding to gain shell access as the user s.smith while also recovering the user flag ...
Hack the Box (HTB) machines walkthrough series — Cascade (Part 1)

Hack the Box (HTB) machines walkthrough series — Cascade (Part 1)

| | Capture the Flag
Today, we will be continuing with our exploration of Hack the Box (HTB) machines, as seen in previous articles. This walkthrough is the first half of an HTB machine named Cascade. HTB ...