Flag name: CVEmaster Anticipated level: Medium Description: A hacker is targeting our HR portals and…
Blog
Blog
Flag name: CVEmaster Anticipated level: Medium Description: A hacker is targeting our HR portals and…
Flag name: Insecure Authentication Anticipated level: Hard Description: FIB obtained an evidence item from an…
Flag name: Happy Flag Anticipated level: Easy Description: We have many flags. But we need…
It was time for Swedish CTF participants to defeat Surtur the villain. The devil who…
Penetration Testing on Demand: The Proactive Approach to Cybersecurity In order to survive in the…
Remediation of insecure direct object vulnerability The exploitation of “insecure direct object vulnerability” occurs when…
What are Bug Bounty Programs? How do they work? Netscape started the first bug bounty…
Every job carries some risks of making mistakes, and building and developing a…
Detect CMSTP.exe with INF Files Infected with Malicious Commands with Free Splunk Detection Rule The…
Detection of Audio Capture Attack with Splunk Detection Rule Detection of Audio Capture Attack ID: T1123…
PsExec is a command-line tool that lets you execute processes on remote systems and redirect…
Mr.B Identity 50 points “A person known as Mr.B claims that he discovered information about…
Hide and Seek! 50 points This challenge has a zip-in download after unzipping we got…
False Alarm 50 points Description: Try to make a dummy alert Solution: Viewing the page…
Eating 50 points Description: Eat or play you can set what you want. After creation…