MSMolly Sohaneyinmollysohaney.hashnode.dev00CTF Writeup: caesar1 | Forensics | Crypto | BS5h ago · 5 min read · Description We intercepted a weirdly glitched file. Apparently, Julius likes to switch things up often, every 10 pixels. We're given a file: caesar1.jpg Overview A JPEG image of sheet music has beeJoin discussion
DVDharshana Vijayindharsh-ctfwriteup.hashnode.dev00Building and Exploiting a Vulnerable Web Application (SQL Injection & XSS)2d ago · 3 min read · As part of my cybersecurity learning journey, I built a deliberately vulnerable web application using Python and Flask. The goal of this project was to understand how common web vulnerabilities work iJoin discussion
JJebitokinsharonjebitok.com00Develpy (CTF Challenge - THM)4d ago · 6 min read · Introduction Develpy is a beginner-friendly TryHackMe challenge that focuses on code injection and privilege escalation via cron job abuse. The attack surface starts with a custom Python 2 service rJoin discussion
JJebitokinsharonjebitok.com00Break Out The Cage (CTF Challenge - THM)4d ago · 18 min read · INTRO In this TryHackMe room, Break Out The Cage, we step into a Nicolas Cage-themed CTF that layers enumeration, classical cryptography, and privilege escalation into a full attack chain. The challenJoin discussion
JJebitokinsharonjebitok.com00Team (CTF Challenge - THM)4d ago · 8 min read · nmap -p- -sV IP_Address PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.5 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.13 (Ubuntu Linux; protocol 2.0) 80/tcp open http Apache hJoin discussion
JJebitokinsharonjebitok.com00Wonderland (CTF Challenge - THM)4d ago · 12 min read · Intro: Wonderland is a beginner-friendly CTF room on TryHackMe themed around Lewis Carroll's Alice in Wonderland. The challenge walks through a full attack chain — web enumeration, steganography hintsJoin discussion
MSMolly Sohaneyinmollysohaney.hashnode.dev00CTF Writeup: ads | Forensics | BSidesSF 20265d ago · 6 min read · Description "We found this video, we know there is a flag in it somewhere!" Overview This challenge hides a flag inside a secondary video stream embedded in an MP4 file. The visible video is just bJoin discussion
JJebitokinsharonjebitok.com00Message to Garcia (TryHackMe)Mar 7 · 12 min read · Introduction In 1899, Elbert Hubbard wrote a short essay that would outlive him by over a century. It told the story of Lt. Andrew Rowan, a soldier given one mission: deliver a message to General GarcJoin discussion
JJebitokinsharonjebitok.com00Corp Website (TryHackMe) - CVE-2025-55182 (React2shell) Mar 7 · 2 min read · My Dearest Hacker, Valentine's Day is fast approaching, and "Romance & Co" are gearing up for their busiest season. Behind the scenes, however, things are going wrong. Security alerts suggest that "RoJoin discussion
CCrypt(iq)iniqmacodes.hashnode.dev00Weirdsnake CTFMar 6 · 6 min read · Weirdsnake is a medium level reverse engineering CTF from pico - link Challenge After downloading the file, which turned out to be python bytecode which I was completely unfamiliar with. I read a coJoin discussion