CTF

An Attack Vector on Minecraft: Exploring Blocky CTF

Exploring Blocky CTF: An Attack Vector on Minecraft This is a writeup presented by Behind Security as part of the OSCP Roadmap series, focusing on the Blocky CTF from HackTheBox. The writeup takes the form of a detailed pentest report. Blocky CTF This challenge showcases the dangers of poor password practices and the exposure of

An Attack Vector on Minecraft: Exploring Blocky CTF Read More »

Hands-On Windows SMB Exploitation: Unleashing the Legacy CTF Challenge

Hands-On Windows SMB Exploitation: Unleashing the Legacy CTF Challenge Legacy Legacy is a fairly straightforward beginner-level machine which demonstrates the potential security risks of SMB on Windows. HackTheBox Hack The Box gives individuals, businesses and universities the tools they need to continuously improve their cybersecurity capabilities — all in one place. BEHIND SECURITY Behind Security

Hands-On Windows SMB Exploitation: Unleashing the Legacy CTF Challenge Read More »

Exploring Eternal Blue! HTB Blue CTF

Exploring Eternal Blue! A writeup by Behind Security on a challenge named Blue from HackTheBox. You can see a informative dashboard below. Blue Challenge that covers enumeration and exploitation of a windows machine running a vulnerable SMB server. HackTheBox Hack The Box gives individuals, businesses and universities the tools they need to continuously improve their

Exploring Eternal Blue! HTB Blue CTF Read More »

Writeup: Valley CTF

Valley CTF Writeup Valley CTF from TryHackMe includes many essentials cybersecurity topics, like: Confidential information exposure; PCAP analysis; Reverse engineering of a ELF executable; Horizontal privilege escalation; Python module hijacking; Vertical privilege escalation. Simplifying cybersecurity 1. Port scanning Common ports, also known as ‘Well-known Ports’ or ‘Registered Ports’, are numbered ports that have been assigned

Writeup: Valley CTF Read More »

Scroll to Top