PicoCTF: “where are the robots” [CTF Write Up]

Have you ever thought about joining the forces of white hat hackers and penetration testers? Don’t you know where to start or how to practice some skills? Though capture the flag games, or CTFs in short, are not the most life-like situations, they can help you to build a way of thinking and to learn the basic tools. PicoCTF is a great site to start as a beginner.

Continue reading “PicoCTF: “where are the robots” [CTF Write Up]”

TryHackMe’s Advent of Cyber – A Gift for Cyber Security Enthusiasts

In the ever-evolving landscape of cyber security, staying ahead of the curve is not just a preference but a necessity. Continuous learning and hands-on practice are crucial components of honing the skills required to defend againsTryHackMet the relentless onslaught of cyber threats. TryHackMe, a leading platform for cyber security education, has introduced an innovative and festive approach to learning with its Advent of Cyber series. This blog post explores the unique features that make TryHackMe’s Advent of Cyber a valuable resource for individuals seeking to enhance their cyber security prowess.

Continue reading “TryHackMe’s Advent of Cyber – A Gift for Cyber Security Enthusiasts”

TryHackMe | Simple CTF – Modern Solution (2023) Working Exploit With Docker.io

If you have been doing the TryHackMe Simple CTF challenge recently, you may have ran into the problem that the original exploit is written in Python 2 for Ubuntu 18.04. The script can be converted or rewritten to Python 3, but my Debian Bookworm attack box had issues running it and showing the result. I came up with a quick solution using docker.io.

Continue reading “TryHackMe | Simple CTF – Modern Solution (2023) Working Exploit With Docker.io”