Showing 130 Result(s)

WolvCTF OSINT WOLPHV II: Infiltrate Writeup

CTF link. We need to search for a social media account, again we do a simple search and discover a Facebook page. When we check his Facebook account, we come across a video. If we pause the video while closing the screen sharing at the end of the video, we find a discord channel. We …

WolvCTF OSINT WOLPHV I: Reconnaissance Writeup

CTF link. A new ransomware group you may have heard about has emerged: WOLPHV There’s already been reports of their presence in articles and posts. NOTE: Wolphv’s twitter/X account and https://wolphv.chal.wolvsec.org/ are out of scope for all these challenges. Any flags found from these are not a part of these challenges This is a start to a 5 part series …

WolvCTF Misc: Made Sense Writeup

CTF link. i couldn’t log in to my server so my friend kindly spun up a server to let me test makefiles. at least, they thought i couldn’t log in 😛 Download the code of the page by clicking on the link and examine it in detail. Detailed explanation of the code is made in …

WolvCTF Crypto: yORs Truly <3 Writeup

CTF link. I have encrypted some text but it seems I have lost the key! Can you find it? With the hint given in the Hint section, we rearrange the code according to XOR. “A text string can only be decrypted by reapplying the XOR function with the key” wctf{X0R_i5_f0rEv3r_My_L0Ve}

WolvCTF Web: The Gauntlet Writeup

CTF link. A long web question awaits us 😊 To access the flag on our first page, we need to view the source of the page. At the very end of the page source we will reach a URL again. Page 1 When we go to the URL, we get the following result: We edit …

Writeup: Web shell upload via obfuscated file extension

Lab link. If the application has taken precautions for the file extension, there are several ways to bypass this precaution. In this lab, we use the null byte method to bypass the file extension blocking. In Requesat’s response, we see that our file was uploaded correctly. In the GET /files/avatars/ we correct our file name …

Writeup: Web shell upload via extension blacklist bypass

Lab link. The application has used a blacklist for security, but if we upload the .htaccess file, we can allow any file extension we want on the server. The file with the .php extension does not work. We make changes to the POST /my-account/avatar request. Now we can upload files with .l33t extension. We change …

Writeup: Web shell upload via path traversal

Lab link. In some systems, there may be more than one vulnerability, or we may continue with a different vulnerability in the continuation of one vulnerability. In this lab, we can upload files thanks to path traversal. In the lab, we are asked to access the file /home/carlos/secret. We create a php file to access …