Showing 10 Result(s)

WolvCTF Forensics: Log Analysis Writeup

CTF link. Hi there incident responder. So we have this company that was breached sometime last week, but their SOC team only keeps HTTP request logs 🙁 We took down all of our wolvsecsolutions websites as a precaution. Maybe there’s still a way to figure out what happened? Why did they click on a suspicious link? Somebody …

WolvCTF OSINT WOLPHV II: Infiltrate Writeup

CTF link. We need to search for a social media account, again we do a simple search and discover a Facebook page. When we check his Facebook account, we come across a video. If we pause the video while closing the screen sharing at the end of the video, we find a discord channel. We …

WolvCTF OSINT WOLPHV I: Reconnaissance Writeup

CTF link. A new ransomware group you may have heard about has emerged: WOLPHV There’s already been reports of their presence in articles and posts. NOTE: Wolphv’s twitter/X account and https://wolphv.chal.wolvsec.org/ are out of scope for all these challenges. Any flags found from these are not a part of these challenges This is a start to a 5 part series …

WolvCTF Misc: Made Sense Writeup

CTF link. i couldn’t log in to my server so my friend kindly spun up a server to let me test makefiles. at least, they thought i couldn’t log in 😛 Download the code of the page by clicking on the link and examine it in detail. Detailed explanation of the code is made in …

WolvCTF Crypto: yORs Truly <3 Writeup

CTF link. I have encrypted some text but it seems I have lost the key! Can you find it? With the hint given in the Hint section, we rearrange the code according to XOR. “A text string can only be decrypted by reapplying the XOR function with the key” wctf{X0R_i5_f0rEv3r_My_L0Ve}

WolvCTF Web: The Gauntlet Writeup

CTF link. A long web question awaits us 😊 To access the flag on our first page, we need to view the source of the page. At the very end of the page source we will reach a URL again. Page 1 When we go to the URL, we get the following result: We edit …