Blue: A Historic CTF
Getting the flags for the Blue CTF is relatively straightforward once SMB exposure is identified. The more interesting challenge lies in post-exploitation navigation and overcoming Meterpreter quirks.
3D printed files in the shop! Saga in the posts! Video and crowdfunding out soon! (ᵔ◡◡ᵔ)
As per requests, here is the Cyberspacemanmike donation page! If you like the channel and would like to support it, please consider donating.
Getting the flags for the Blue CTF is relatively straightforward once SMB exposure is identified. The more interesting challenge lies in post-exploitation navigation and overcoming Meterpreter quirks.
With this CTF we start to move from beginner CTF to intermediate, if only just a little. We will practice a very basic form of attack chaining by using a shell to get an elevated shell.
CTFs won’t teach you anything except that you’re not as smart as you think you are! And that’s a good thing!
This week’s CTF is Bounty Hackers. We’ll learn that privilege escalation isn’t all that and AI doesn’t know WTF it is talking about!
The main lesson of Basic Pentesting CTF is that enumeration wins boxes. If you can enumerate users, shares, and services, you’ll guess less.
The Pickle Rick CTF is a solid CTF built for beginners and hosted on Tryhackme.com. But what are its most important lessons? Let’s find out!
This walkthrough covers my completion of “A Simple CTF” on TryHackMe.com. Learn the basics of OVPN and hacking CTFs!
The Top 10 TryHackMe CTFs for Beginners; featuring more comprehensive, far more useful descriptions of the rooms than anything THM provides!
Cyberspacemanmike Collaboration: I’m open to ideas! Submit yours and maybe we can team up on a project! Check out what I’m interested in rn…
The 3D Printed Countercade Video is FINALLY Up!!! Hopefully this video will be a cross-over hit that will help grow the channel