Local Authority - picoCTF Writeup
A picoCTF web challenge focused on weak client-side authentication, where the valid credentials are exposed in a JavaScript file.
285 words
|
1 minute
Cover Image of the Post
Old Sessions - picoCTF Writeup
A picoCTF web challenge where exposed session data allows us to replace our cookie with an admin session and access the flag.
241 words
|
1 minute
Cover Image of the Post
SSTI1 - picoCTF Writeup
A picoCTF web challenge that demonstrates server-side template injection in a Flask application and leads to file disclosure through template execution.
282 words
|
1 minute
Cover Image of the Post
Bookmarklet - picoCTF Writeup
A quick picoCTF web challenge where the flag is hidden inside a JavaScript bookmarklet and can be recovered by understanding the client-side decryption logic.
292 words
|
1 minute
Cover Image of the Post
WebDecode - picoCTF Writeup
A beginner-friendly picoCTF web challenge where the flag is hidden in page source as Base64-encoded data.
174 words
|
1 minute
Cover Image of the Post
The Benarroch File CTF Writeup
An OSINT challenge writeup that traces a real Interpol Red Notice subject through public company records to identify a last known 2015 address.
529 words
|
3 minutes
Cover Image of the Post
Operation Takeover TryHackMe Writeup
A simple TryHackMe writeup for Operation Takeover covering Nmap, UDP discovery, SNMP enumeration, and reading the root flag through the NET-SNMP-EXTEND feature.
1019 words
|
5 minutes
Cover Image of the Post
Cap Hack The Box Writeup
A simple Hack The Box writeup for Cap covering Nmap enumeration, an IDOR issue in PCAP snapshots, credential recovery from FTP traffic, SSH access, and privilege escalation through Linux capabilities.
515 words
|
3 minutes
Cover Image of the Post