Network Forensics Challenges
PcapPoisoning Challenge How about some hide and seek heh? Download the pcap file attached and find the flag. Solution The challenge is very simple if you know your way around wireshark. I have ...
PcapPoisoning Challenge How about some hide and seek heh? Download the pcap file attached and find the flag. Solution The challenge is very simple if you know your way around wireshark. I have ...
Introduction Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and an ...
This is a quick blog entry cheatsheet for system administrators to refer to quickly in their day to day work. I will be adding in more categories to the cheatbook in the future. For most of the...
Introduction I have recently moved back to using Windows as the new Apple M1 and M2 chips are not compatible with running vagrant and virtualbox. As someone who likes to run labs locally without br...
Summary It has been a while last I did an online CTF. So this entry is a refresher on my knowledge of binary analysis. We are given a binary file to analyze and find the flags. The challenges wer...
Introduction In the previous blog entry, we looked at the implementation details of PyRedactKit for improving performance, reducing code smells by refactoring, Using automated testing and code s...
Introduction Check out the project here! To start using: pip install --upgrade pyredactkit && prk There are a lot of open-source cyber security tools that help automate a lot of ...
Didnβt really have much time to tackle a lot of the challenges with this CTF and only managed to pwn 3 of them. A big shoutout to my team mates Mocha and Dante for a lot of initial enumerations!...
Introduction When you are working with cloud, REST APIs or any type of web service, you will come across a lightweight data-interchange format called JSON (JavaScript Object Notation). I wonβt go ...
CVE-XXXX-XXXXX Enter the CVE of the vulnerability as the flag with the correct flag format: picoCTF{CVE-XXXX-XXXXX} replacing XXXX-XXXXX with the numbers for the matching vulnerability. The CVE we...