Showing 49 Result(s)

SwampCTF 2024 OSINT: Lost in Space Writeup

CTF link. I think OSINT challenges are stupid! If they aren’t, prove it! How far away is this? Don’t bother giving me the unit, there’s only one that you should be using in space anyways (use Astronomical Units). The flag entry is extremely forgiving just make sure you get the integer for distance right. This a classic …

TexSAW2024 OSINT: Geo-Location Writeup

CTF link. Find what street this picture was taken from. Format the flag as the following: The street name in all caps with the spaces replaced by underscores. Write the full word for any abbreviated parts of the name. Example: If the street was Bourbon St the flag would be: texsaw{BOURBON_STREET} When we look at the …

TexSAW2024 OSINT: Sherlock Writeup

CTF link. I need to study for a class but the quizlet I’m using has jumbled up answers that just don’t make sense. Can you figure out how to read it? https://quizlet.com/882185739/sherlock-flash-cards/?funnelUUID=acf2df22-5f5c-4a67-9131-d0b6b18047df When we go to the Quizlet application, we see the Twitter link of the creator. The Twitter account “Vigenère cipher! 🔑 HACK” shows …

WolvCTF OSINT WOLPHV II: Infiltrate Writeup

CTF link. We need to search for a social media account, again we do a simple search and discover a Facebook page. When we check his Facebook account, we come across a video. If we pause the video while closing the screen sharing at the end of the video, we find a discord channel. We …

WolvCTF OSINT WOLPHV I: Reconnaissance Writeup

CTF link. A new ransomware group you may have heard about has emerged: WOLPHV There’s already been reports of their presence in articles and posts. NOTE: Wolphv’s twitter/X account and https://wolphv.chal.wolvsec.org/ are out of scope for all these challenges. Any flags found from these are not a part of these challenges This is a start to a 5 part series …

Tryhackme: Network Device Hardening Writeup

The Room: “Learn techniques for securing and protecting network devices from potential threats and attacks.” https://tryhackme.com/room/networkdevicehardening Task 2: Common Threat and Attack Vectors 2.1. The device that is used to control and manage network resource is called? Network device 2.2. A threat vector that includes disruption of critical devices and services to make them unavailable …