Flag name: Navy Encoding Anticipated level: Medium Description: Let’s get our hands dirty with some…
Blog
Blog
Flag name: Navy Encoding Anticipated level: Medium Description: Let’s get our hands dirty with some…
Flag name: They all look the same Anticipated level: Medium-Hard Description: They are slightly different…
Flag name: HTTP flag Anticipated level: Easy-Medium Description: If you investigate the given files properly…
Flag name: Query the Flag Anticipated level: Easy Description: Query the flag How to solve…
Penetration testing is used to test the exploitations and vulnerabilities of an organization’s system…
What is Web Application Penetration Testing? Almost everything we do is done over the…
What is Crowdsourced Penetration Testing? the only guide you need. Nowadays, crowdsourced security penetration testing…
What Is Red Teaming in Cyber Security? Here’s an Inside Look. In cyber security,…
Malware, tools, or other non-native files dropped or created on a system by an adversary…
Detect File and Directory Permissions Modification File and directory permissions are commonly managed by discretionary…
Detect Deobfuscate /Decode Files or Information Adversaries may use Obfuscated Files or Information to hide…
Detect Malicious Control Panel Items With This Free Splunk Detection Rule Windows Control Panel items…
It All Starts From The Beginning 200 points Can you find the beginning!? File: fina, Main.java Fina…
Asymetricjob 200 points 1024.txt PePAW8C9Lm7yxsyA2MShozuHpDrRZJssZECWAYULMEMq7pfcX4cUyKpWvW8ZVQis+KtxT7pa1LEcq4UvYW8Gm44nTUwPOOzqw86MXonJ8Mwgx9gXlZHNReG/X2+bynejQo36b1axIt9RujXCxXzEsOzO/gpSVE24bgvwwvU+C28= Keys.asymmetric MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCO5+gAGMWkPvEtXWLRaqxSm3PeNtMMDfbGQs15Gms7trqxGnK+pjZslc4oVyw6cu5RHrt4YpfGY1VeXG8ZeIiY5BagA7eMP8Rv5ixblyhA51MMDNd/+gNcDZH4MvtM1KsDYYeeD9SXKrBI10znG7nxV4fAB39Y4PW8UzMv8GFVEQIDAQAB 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 Solution I’m writing this writeup a bit…
1FAGuy 200 points We have obtained these files from a Hacker’s computer known as 1FAGuy.…
Send License 50 points Description: We have bought a service but unfortunately we lost the…