Capture the flag (CTF)

Breaking into Fortress DC416 – CTFha

In this article, we will be solving fortress VM which is one of the VMS created by Vulnhub team for DEFCON Toronto's 2016 offline CTF. Introduction I picked

USV CTFh

CTF-USV 2016 was created by Suceava University. There are 7 flags that should be discovered in the form of: Country_name Flag: [md5 hash]. We hosted the VM i

Stapler Walkthrough

Stapler is a boot2root challenge we are going to solve. We hosted the machine in VirtualBox and fired nmap on its IP address and below is the result: [pkad

SkyDog Con CTF - Catch Me If You Can

In this challenge there are eight flags are in the form of flag {MD5 Hash} such as flag{1a79a4d60de6718e8e5b326e338ae533}. We hosted the VM in virtualbox di

Seattle VM Walkthrough

We hosted the VM in virtual box and opened the system's IP from our browser, and we found a web application running on it. [pkadzone zone="main_top"] This we

PWN The PwnLab

Here is another interesting boot2root challenge we are going to solve. The vulnerable machine's name is PwnLab. We hosted the machine in VirtualBox and fire

Penetration Testing Resources: CTFs and Contests

Introduction Our last article provided a substantial background into what Penetration Testing is all about. Specifically, the following topics were covered:

Mr. Robot Challenge

Based on the TV show, Mr. Robot.[pkadzone zone="main_top"] This VM has three keys hidden in different locations. The main goal is to find all three tokens

What a Challenger Perceives in most CTF Categories/Challenges

Did you have fun playing our very own Capture the Flag (CTF) challenges? I know it's been a long time though since we launched the n00bs CTF Labs and Practic

SpyderSec Challenge

Here is another interesting challenge we are going to solve. The vulnerable machine's name is SpyderSec. We hosted the machine in VirtualBox and fired nmap o