-
Writeup - Cyber Apocalypse CTF 2021
Apr 24, 2021
Cyber Apocalypse 2021 was held between 13:00 19 April 2021 UTC and 23:00 24 April 2021 UTC. Our final rank was #479 out of 4740 teams. Not bad, I’d say :) Contents Hardware Serial Logs Compromised Secure Off the grid Web Wild goose hunt MiniSTRyplace Misc Input as a Service Hardware There were 6 hardware challenges in this event and I was able to solve 4 of them.…more
-
Shocker - HackTheBox
Mar 21, 2021
Info Machine Profile Recon Nmap scan shows 2 open ports: Starting Nmap 7.91 ( https://nmap.org ) at 2020-11-11 21:20 AEDT Nmap scan report for 10-10-10-56.tpgi.com.au (10.10.10.56) Host is up (0.015s latency). PORT STATE SERVICE VERSION 80/tcp open http Apache httpd 2.4.18 ((Ubuntu)) |_http-server-header: Apache/2.4.18 (Ubuntu) |_http-title: Site doesn't have a title (text/html). 2222/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2048 c4:f8:ad:e8:f8:04:77:de:cf:15:0d:63:0a:18:7e:49 (RSA) | 256 22:8f:b1:97:bf:0f:17:08:fc:7e:2c:8f:e9:77:3a:48 (ECDSA) |_ 256 e6:ac:27:a3:b5:a9:f1:12:3c:34:a5:5d:5b:eb:3d:e9 (ED25519) Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Service detection performed.…more
-
Valentine - HackTheBox
Mar 17, 2021
Info Machine Profile Reconnaissance Initial nmap scan shows the following: PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.9p1 Debian 5ubuntu1.10 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 1024 96:4c:51:42:3c:ba:22:49:20:4d:3e:ec:90:cc:fd:0e (DSA) | 2048 46:bf:1f:cc:92:4f:1d:a0:42:b3:d2:16:a8:58:31:33 (RSA) |_ 256 e6:2b:25:19:cb:7e:54:cb:0a:b9:ac:16:98:c6:7d:a9 (ECDSA) 80/tcp open http Apache httpd 2.2.22 ((Ubuntu)) | http-methods: |_ Supported Methods: GET HEAD POST OPTIONS |_http-server-header: Apache/2.2.22 (Ubuntu) |_http-title: Site doesn't have a title (text/html). 443/tcp open ssl/http Apache httpd 2.…more
Boot2RootHackTheBoxTJnull's ListSSLHeartbleedCVE-2014-0160tmux
-
Nibbles - HackTheBox
Mar 07, 2021
Info Machine Profile Reconnaissance A nmap scan shows us that ports 22 and 80 are open. On port 80 runs a web server. By accessing it in web browser we can see: So naturally we’ll go to /nibbleblog and have a look. Looks like that it’s running a blog engine called Nibbleblog. By running a gobuster enumeration we found some files and directories: =============================================================== Gobuster v3.0.1 by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_) =============================================================== [+] Url: http://10.…more
Boot2RootHackTheBoxTJnull's ListMetasploitNibbleblogPython scripting
-
Cyber Talents Mini CTF Week 3
Feb 21, 2021
Info This was the third one of the Cyber Talents February weekly mini CTFs. Link here There were 5 challenges: detector is an open-source, free and lightweight network intrusion detection system (NIDS) software for Linux and Windows to detect emerging threats. A Google search shows “Snort”. Tried it and it’s the correct answer. LOUDER At the start, we were given a hyper link to an audio file…more
-
牛年灯谜 CTF Writeup Part 2
Feb 14, 2021
Part 1 第二个红包虽然增加了一些难度,但我认为对于即便新手来说仍然是有机会通过观察和少许研究解出的。所以我仍然打算配上较为详细的、尽可能不假设前…more
-
牛年灯谜 CTF Writeup Part 1
Feb 13, 2021
引子 Part 2 一年前我在 UTS 开始学习以来,我打算转向网络/信息安全方向,也由此接触到了 CTF (Capture the Flag) 这种有趣的活动。在农历新年的前一周时,我突然想到或许可…more
-
Cyber Talents Mini CTF Week 1
Feb 08, 2021
Info This was the first one of the Cyber Talents February weekly mini CTFs. Link here There were 5 challenges: Event Manager Software products and services combine security information management and security event management. They provide real-time analysis of security alerts generated by applications and network hardware. So the answer to this question was simply “SIEM”. Funny that I only got this flag at the last because it wasn’t in a flag{xxxx} format and the question itself didn’t look like something to solve LOL.…more
-
Overpass - TryHackMe
Nov 01, 2020
Info This is a room from TryHackMe https://tryhackme.com/room/overpass If you have any questing, or want to discuss anything with me, pelase leave a comment or contact me through methods listed in About Page Recon First, always port scan: nmap -p- -v -T4 10.10.xx.xx 2 ports up. On port 80 is a website: There’s a funny comment in index source: Since they mentioned the Romans, I guess that would be caesar cipher or some kind of shifting cipher LOL.…more
Boot2RootTryHackMeEscalationROT47Web AuthenticationcronDNShosts
-
Looking Glass - TryHackMe
Oct 19, 2020
Info This is a room from TryHackMe. https://tryhackme.com/room/lookingglass This room is a sequel of Wonderland. And here’s my writeup of Wonderland. If you have any questions, or want to discuss anything with me, please leave a comment or find me through methods listed in About Page Recon First thing, no surprise, nmap: nmap 10.10.84.1 | tee nmap.log But this machine gave me a huge surprise: So many ports up. To figure out what services are running on these ports, I tried connecting them with netcat.…more