HackersAreUs

HackersAreUs.com

Don’t learn to Hack,
Hack to learn.

Category: CTF Walkthroughs

  • Challenge Scenario: There’s a new trend of an app the generates a spooky name for you. Users of that application later discovered that their real names were magically changed, causing havoc in their life. Could you help bring down the application? We are given target host IP address and port…

    +
  • DC5 Walkthrough DC-5 is another boot2root from the DC series — a purposely vulnerable Debian 64-bit VM aimed at intermediate users. The author warns it’s a step up in difficulty, so it isn’t ideal for absolute beginners but is well suited to those with some Linux and prior boot2root experience.…

    +
  • DC4 Walkthrough DC4 continues the boot2root “DC” series of virtual machines and is intentionally built for penetration-testing practice. Rated Easy, it’s aimed at beginners. Unlike earlier DC releases, the authors say this VM contains a single flag, provides no clues, and offers multiple possible paths to reach the flag which…

    +
  • Write-up: DC3.2 CTF from Vulnhub The DC-3.2 machine is a beginner-level CTF challenge aimed at testing enumeration, exploitation, and privilege escalation skills. The goal is to gain root access and retrieve the root flag. This walkthrough documents the steps I took to compromise the machine, highlighting lessons learned and techniques…

    +
  • Vulnhub: DC1 Write-up Goal: Obtain root privileges and read the flag I initiated the enumeration by running an nmap scan against the target machine. Nmap is more than just a port scanner, running the default nmap scripts (-sC or –script option) can reveal a good deal of information about the…

    +
  • TryHackMe: Pickle Rick Goal: Find three files that contain ingredients for Ricks potion so he can transform himself back into a human from a pickle Eastern Washington University BSCS: Cybersecurity 101 extra credit I began by firing up nmap scanner to discover open ports on the victim’s machine. I included…

    +
  • I begin by scanning my network for my target box to obtain the IP Address. eof0100@HackersAreUs:~/pentest/Kioptrix2014$ nmap -sn 10.0.0.0/24 Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-15 21:43 PDT Nmap scan report for 10.0.0.1 Host is up (0.0069s latency). Nmap scan report for 10.0.0.15 Host is up (0.028s latency). Nmap…

    +
  • Today I will be doing a write-up on FritiLeaks 1.3 which could be downloaded from VulnHub. Before I begin here’s a description and goal(s) for this CTF. I begin by performing a ping-sweep on my network to obtain the IP Address of my target. I noticed many folks like to…

    +