Network Security

Poison CTF Writeup

Poison CTF Writeup Writeup presented by Behind Security as part of the Road to OSCP series, focusing on the Poison CTF from HackTheBox. Poison CTF Poison CTF is a machine which focuses mainly on log poisoning and port forwarding/tunneling. The machine is running FreeBSD which presents a few challenges for novice users as many common

Poison CTF Writeup Read More »

Hands-On Windows SMB Exploitation: Unleashing the Legacy CTF Challenge

Hands-On Windows SMB Exploitation: Unleashing the Legacy CTF Challenge Legacy Legacy is a fairly straightforward beginner-level machine which demonstrates the potential security risks of SMB on Windows. HackTheBox Hack The Box gives individuals, businesses and universities the tools they need to continuously improve their cybersecurity capabilities — all in one place. BEHIND SECURITY Behind Security

Hands-On Windows SMB Exploitation: Unleashing the Legacy CTF Challenge Read More »

Exploring Eternal Blue! HTB Blue CTF

Exploring Eternal Blue! A writeup by Behind Security on a challenge named Blue from HackTheBox. You can see a informative dashboard below. Blue Challenge that covers enumeration and exploitation of a windows machine running a vulnerable SMB server. HackTheBox Hack The Box gives individuals, businesses and universities the tools they need to continuously improve their

Exploring Eternal Blue! HTB Blue CTF Read More »

Writeup: Valley CTF

Valley CTF Writeup Valley CTF from TryHackMe includes many essentials cybersecurity topics, like: Confidential information exposure; PCAP analysis; Reverse engineering of a ELF executable; Horizontal privilege escalation; Python module hijacking; Vertical privilege escalation. Simplifying cybersecurity 1. Port scanning Common ports, also known as ‘Well-known Ports’ or ‘Registered Ports’, are numbered ports that have been assigned

Writeup: Valley CTF Read More »

CTF Toolkit

CTF Toolkit In the world of cybersecurity, CTF competitions are an excellent way to improve one’s technical skills and learn new ones. These competitions involve a series of challenges that test various aspects of cybersecurity, such as web application security, networking, cryptography, reverse engineering, and exploitation. A CTF toolkit is a collection of tools that

CTF Toolkit Read More »

Scroll to Top