Posts
logoff
Cancel

With this writeup I decided to not do it with screenshots but rather code snippets. It does look a bit messy. I think next time I will stick to screenshots too. With this challenge we had to answe...

Reconnaissance Let us start with a basic enumeration with nmap. sudo nmap -sC -sV We go to http://10.10.10.223 and we get a default Apache page. We then run feroxbuster web enumeration fer...

Week4 This was the final week and we were given an Android dump. We only had 9 questions and I wasn’t too sure how this one would pan out as I have never done forensics on Android devices befor...

Week3 This week we were given a network dump in the form of a PCAP file. There were 13 challenge questions this week. To be able to analyze this PCAP file we needed to use a program called W...

Week 2 We were given a RAM Acquisition of the suspect disk for week 2. A RAM Acquisition is just a procedure of copying the contents of volatile memory to non-volatile storage. I have done a ...

The United Nations Cybercrime unit in Africa, lead by Carmen Corbin_UN created a unique Digital Forensics CTF competition for the month of May for Africa in the digital forensics cybersecurity fiel...

This is my first Offensive Security writeup of a machine on their Proving Grounds platform. I signed up for the free labs and managed to do 2 easy machines and get this writeup done before the da...

So on a recent CTF challenge I had to crack a hash which proved to be a bit challenging. I have always cracked hashes with dictionaries like the famous rockyou.txt. That's the problem with most CT...

Reconnaissance Let's start off with a NMAP scan Browsing to http://10.10.10.206 we get a page wth a bunch of posts, users and email addresses. I did a bunch of XSS and LFI but none wo...

Reconnaissance Let's start off with a NMAP scan -sV: Probe open ports to determine service/version info -sC: equivalent to --script=default We see this machine does not have any webserve...