Dec 29, 2025 · 2 min read · The Mission: Sir Carrotbane’s Cryptic Find While the systems in Wareville were destabilised, Sir Carrotbane discovered a series of locked PDF and ZIP files deep within the servers. These files are rumoured to contain fragments of Santa's master gift ...
Join discussionDec 9, 2025 · 10 min read · This challenge drops us back into the shifting world between Easter and Christmas, where the once‑stable systems of The Best Festival Company begin behaving strangely. Hidden deep within the servers, Sir Carrotbane stumbles upon a collection of encry...
Join discussion
Jul 26, 2025 · 20 min read · Basic Terms What are Hashes? A hash is a way of taking a piece of data of any length and representing it in another fixed-length form. This process masks the original value of the data. The hash value is obtained by running the original data through ...
Join discussionJul 20, 2025 · 5 min read · In this challenge, we take on the role of an attacker performing a full compromise of a Linux system — from external enumeration to post-exploitation. The machine gives us insight into common misconfigurations that lead to system compromise. It also ...
Join discussion
Jun 18, 2025 · 3 min read · Hey again, fellow wanderers of the wire. This chapter took its time. I’ll be honest — getting through cryptography basics was way harder than I expected, and not because the content was overwhelming. It was me. The procrastination, the distractions, ...
Join discussion
Jun 16, 2025 · 2 min read · This article will cover the Basic Pentesting write-up on THM Challenges. Web App Testing and Privilege Escalation In these set of tasks you'll learn the following: brute forcing hash cracking service enumeration Linux Enumeration The main goal ...
Join discussion
Jan 12, 2025 · 6 min read · In this article, we’ll cover Hash cracking - You wanna know what happens to your hashes? write-up as the Day 23 challenge of the Advent of Cyber event challenge. It involved hash functions and hash values, saving hashed passwords, cracking hashes, an...
Join discussion
Oct 28, 2024 · 3 min read · In this article, I will write a write-up for John the Ripper: The Basics that the Basic Terms, Setting Up John on Your System, Cracking Basic Hashes, Cracking Windows Authentication Hashes, Cracking /etc/shadow Hashes, Single Crack Mode, Custom Rules...
Join discussion
Sep 16, 2024 · 2 min read · Mình thấy bài này trong module Metasploit: Exploitation. Một bài Reverse Shell khá hay nên mình muốn ghi chép lại. 1, Kết nối SSH Ta được cung cấp username/password của người dùng: murphy/1q2w3e4r Kết nối SSH: ssh murphy@{target_IP} khi vào được ter...
Join discussion