Capture the Flag
Intel Hardware CTF Competitions Drive Innovation for Next-Gen Secure Computing Platforms
The concept of capture the flag competitions goes back hundreds of years from a military perspective, and it has become a staple of hacking and cybersecurity exercises. The basic concept pits teams ...
Typo 1: VulnHub CTF walkthrough (part 2)
Introduction In the previous article, Part 1 of this CTF, we were able to complete the following steps on the victim machine: Getting the target machine IP address by running the VM ...
Typo 1: VulnHub CTF walkthrough (part 1)
In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named Akanksha Sachin Verma. As per the description given by ...
Source 1: VulnHub CTF walkthrough
In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named darkstar7471. Per the description given by the author, this ...
PWNED 1: VulnHub CTF walkthrough
In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named Ajs Walker. As per the description given by the ...
Hack the Box (HTB) machines walkthrough series — Cascade (part 2)
We’re continuing from Part 1 of this machine, where we carried out a lot of enumeration and decoding to gain shell access as the user s.smith while also recovering the user flag ...
Hack the Box (HTB) machines walkthrough series — Cascade (Part 1)
Today, we will be continuing with our exploration of Hack the Box (HTB) machines, as seen in previous articles. This walkthrough is the first half of an HTB machine named Cascade. HTB ...
ZION: 1.2 — VulnHub CTF walkthrough (part 1)
Introduction In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by André Henrique. Per the description given by the author, you must ...
Hack the Box (HTB) Machines Walkthrough Series – Traceback
Today, we will be continuing with our exploration of Hack the Box (HTB) machines, as seen in previous articles. This walkthrough is of an HTB machine named Traceback. HTB is an excellent ...
Capture the flag: A walkthrough of SunCSR’s Geisha
Introduction Welcome to my write-up for the Geisha machine from VulnHub. This is a beginner- to intermediate-level, intentionally vulnerable virtual machine created for the purposes of testing and... Go on to the ...

