HackersAreUs

HackersAreUs.com

Don’t learn to Hack,
Hack to learn.

Category: CTF Walkthroughs

  • DC5 Walkthrough DC-5 is another boot2root from the DC series — a purposely vulnerable Debian 64-bit VM aimed at intermediate users. The author warns it’s a step up in difficulty, so it isn’t ideal for absolute beginners but is well suited to those with some Linux and prior boot2root experience.…

    +
  • DC4 Walkthrough DC4 continues the boot2root “DC” series of virtual machines and is intentionally built for penetration-testing practice. Rated Easy, it’s aimed at beginners. Unlike earlier DC releases, the authors say this VM contains a single flag, provides no clues, and offers multiple possible paths to reach the flag which…

    +
  • Write-up: DC3.2 CTF from Vulnhub The DC-3.2 machine is a beginner-level CTF challenge aimed at testing enumeration, exploitation, and privilege escalation skills. The goal is to gain root access and retrieve the root flag. This walkthrough documents the steps I took to compromise the machine, highlighting lessons learned and techniques…

    +
  • Vulnhub: DC1 Write-up Goal: Obtain root privileges and read the flag I initiated the enumeration by running an nmap scan against the target machine. Nmap is more than just a port scanner, running the default nmap scripts (-sC or –script option) can reveal a good deal of information about the…

    +
  • TryHackMe: Pickle Rick Goal: Find three files that contain ingredients for Ricks potion so he can transform himself back into a human from a pickle Eastern Washington University BSCS: Cybersecurity 101 extra credit I began by firing up nmap scanner to discover open ports on the victim’s machine. I included…

    +
  • I begin by scanning my network for my target box to obtain the IP Address. eof0100@HackersAreUs:~/pentest/Kioptrix2014$ nmap -sn 10.0.0.0/24 Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-15 21:43 PDT Nmap scan report for 10.0.0.1 Host is up (0.0069s latency). Nmap scan report for 10.0.0.15 Host is up (0.028s latency). Nmap…

    +
  • Today I will be doing a write-up on FritiLeaks 1.3 which could be downloaded from VulnHub. Before I begin here’s a description and goal(s) for this CTF. I begin by performing a ping-sweep on my network to obtain the IP Address of my target. I noticed many folks like to…

    +