Blue: A Historic CTF
Getting the flags for the Blue CTF is relatively straightforward once SMB exposure is identified. The more interesting challenge lies in post-exploitation navigation and overcoming Meterpreter quirks.
Getting the flags for the Blue CTF is relatively straightforward once SMB exposure is identified. The more interesting challenge lies in post-exploitation navigation and overcoming Meterpreter quirks.
With this CTF we start to move from beginner CTF to intermediate, if only just a little. We will practice a very basic form of attack chaining by using a shell to get an elevated shell.
This week’s CTF is Bounty Hackers. We’ll learn that privilege escalation isn’t all that and AI doesn’t know WTF it is talking about!
The main lesson of Basic Pentesting CTF is that enumeration wins boxes. If you can enumerate users, shares, and services, you’ll guess less.
The Pickle Rick CTF is a solid CTF built for beginners and hosted on Tryhackme.com. But what are its most important lessons? Let’s find out!
This walkthrough covers my completion of “A Simple CTF” on TryHackMe.com. Learn the basics of OVPN and hacking CTFs!
My notes on hardening Kali Linux.
When attempting the Breaching Active Directory room on Tryhackme.com, do you get the following error: “systemd-resolve: command not found?” This is an error that I came across while developing a livestreaming walk-through for the Breaching Active Directory room (check out the calendar on the cyberspacemanmike.com homepage for more livestreaming events). Early in the hacking exercise,