Feb 8 · 12 min read · Credits Room: “Archangel”Creator: Archangel Introduction The Target: Exploiting LFI to get RCE via Log Poisoning The Problem: The default ../ path was filtered by the server when trying to exploit the LFI The Tools: RustScan, Feroxbuster & FFUF ...
Join discussionJan 19 · 7 min read · During an engagement, I identified a Local File Inclusion (LFI) vulnerability in a document transfer application written in plain PHP. Although the application enforced strict file upload controls—restricting uploads to .doc, .docx, and .pdf files an...
Join discussionJan 15 · 9 min read · Introduction Tokyo Ghoul CTF Challenge - A Complete Walkthrough This write-up documents my journey through the "Tokyo Ghoul" room on TryHackMe, a beginner-to-intermediate level capture-the-flag challenge inspired by the popular anime series. This roo...
Join discussion
Aug 11, 2025 · 5 min read · Introduction During Bugcrowd CTF at Black Hat USA 2025, I tackled a web challenge involving SecureFile Solutions, a document management system with a hidden Local File Inclusion (LFI) vulnerability in its index.php. This journey involved exploiting t...
Join discussionAug 8, 2025 · 6 min read · The Archangel challenge simulated a real-world vulnerable web application environment where misconfigurations and insecure coding practices could be chained together for full system compromise. The target machine hosted multiple virtual hosts and dev...
Join discussion
Jul 25, 2025 · 2 min read · This challenge focuses on Local File Inclusion (LFI), a vulnerability where an application includes files based on user input without proper validation. In practice, this allows attackers to read sensitive files or even achieve code execution. The go...
Join discussion
Jul 14, 2025 · 5 min read · Scenario The company INLANEFREIGHT has contracted you to perform a web application assessment against one of their public-facing websites. They have been through many assessments in the past but have added some new functionality in a hurry and are pa...
Join discussion
Mar 15, 2025 · 8 min read · Introduction Hi everyone, how are you doing? Today, we are doing the "Titanic" from hackthebox, which is an easy to medium box for beginners. This box starts with a directory traversal vulnerability in a Flask application, which discloses one of the ...
Join discussion
Oct 20, 2024 · 5 min read · السلام عليكم Assalamualaikum, everyone! I will not introduce myself this one, cuz it’s os pouring when I read others’ write-ups The bug hasn’t been fixed yet, so I won’t mention the website’s name. Let’s just call it freepalestine.com The story fro...
Join discussion