Showing 119 Result(s)

TexSAW2024 Forensics: Malicious Threat Writeup

CTF link. In the wake of recent security breaches, it has become paramount to ensure the integrity and safety of our systems. A routine audit of our admin activity logs has revealed several anomalies that could suggest a breach or an attempted breach. These logs are critical to understanding the actions taken by users with …

TexSAW2024 OSINT: Geo-Location Writeup

CTF link. Find what street this picture was taken from. Format the flag as the following: The street name in all caps with the spaces replaced by underscores. Write the full word for any abbreviated parts of the name. Example: If the street was Bourbon St the flag would be: texsaw{BOURBON_STREET} When we look at the …

TexSAW2024 OSINT: Sherlock Writeup

CTF link. I need to study for a class but the quizlet I’m using has jumbled up answers that just don’t make sense. Can you figure out how to read it? https://quizlet.com/882185739/sherlock-flash-cards/?funnelUUID=acf2df22-5f5c-4a67-9131-d0b6b18047df When we go to the Quizlet application, we see the Twitter link of the creator. The Twitter account “Vigenère cipher! 🔑 HACK” shows …

Portswigger: Exploiting XXE via image file upload Writeup

Lab link. This lab lets users attach avatars to comments and uses the Apache Batik library to process avatar image files. To solve the lab, upload an image that displays the contents of the /etc/hostname file after processing. Then use the “Submit solution” button to submit the value of the server hostname. In some systems, we need …

Portswigger: Exploiting XInclude to retrieve files Writeup

Lab link. This lab has a “Check stock” feature that embeds the user input inside a server-side XML document that is subsequently parsed. Because you don’t control the entire XML document you can’t define a DTD to launch a classic XXE attack. To solve the lab, inject an XInclude statement to retrieve the contents of the /etc/passwd file. XInclude is a …