Posts by Tag

ctf

5Charlie CTF - Escalator

6 minute read

A write-up of the “Escalator” privelege escalation challenge set from 5Charlie CTF.

5Charlie CTF - Easy Too

2 minute read

A write-up of the “Easy Too” reverse engineering challenge from 5Charlie CTF.

5Charlie CTF - Myste-RE

less than 1 minute read

A write-up of the “Myste-RE” reverse-engineering challenge from 5Charlie CTF.

5Charlie CTF - Odyssey

4 minute read

A write-up of the “Odyssey” container memory export forensic analysis challenge from 5Charlie CTF.

5Charlie CTF - MP3 - Pop

less than 1 minute read

A write-up of the “Pop” audio steganography challenge from 5Charlie CTF.

5Charlie CTF - Exfil - MD5

less than 1 minute read

A write-up of the “MD5” network covert-channel pcap analysis challenge from 5Charlie CTF.

5Charlie CTF - Evasion

3 minute read

A write-up of the Aperture Linux live system forensics challenge from 5Charlie CTF.

5Charlie CTF - BMP

1 minute read

A write-up of the BMP image steganography challenge from 5Charlie CTF.

5Charlie CTF - Blackjack

3 minute read

A write-up of the Blackjack Python application security challenge from 5Charlie CTF.

5Charlie CTF - Aperture

4 minute read

A write-up of the Aperture Linux live system forensics challenge from 5Charlie CTF.

5Charlie CTF - 0day

7 minute read

A write-up of the 0day Windows memory forensics challenge from 5Charlie CTF.

Back to Top ↑

write-up

5Charlie CTF - Escalator

6 minute read

A write-up of the “Escalator” privelege escalation challenge set from 5Charlie CTF.

5Charlie CTF - Easy Too

2 minute read

A write-up of the “Easy Too” reverse engineering challenge from 5Charlie CTF.

5Charlie CTF - Myste-RE

less than 1 minute read

A write-up of the “Myste-RE” reverse-engineering challenge from 5Charlie CTF.

5Charlie CTF - Odyssey

4 minute read

A write-up of the “Odyssey” container memory export forensic analysis challenge from 5Charlie CTF.

5Charlie CTF - MP3 - Pop

less than 1 minute read

A write-up of the “Pop” audio steganography challenge from 5Charlie CTF.

5Charlie CTF - Exfil - MD5

less than 1 minute read

A write-up of the “MD5” network covert-channel pcap analysis challenge from 5Charlie CTF.

5Charlie CTF - Evasion

3 minute read

A write-up of the Aperture Linux live system forensics challenge from 5Charlie CTF.

5Charlie CTF - BMP

1 minute read

A write-up of the BMP image steganography challenge from 5Charlie CTF.

5Charlie CTF - Blackjack

3 minute read

A write-up of the Blackjack Python application security challenge from 5Charlie CTF.

5Charlie CTF - Aperture

4 minute read

A write-up of the Aperture Linux live system forensics challenge from 5Charlie CTF.

5Charlie CTF - 0day

7 minute read

A write-up of the 0day Windows memory forensics challenge from 5Charlie CTF.

Back to Top ↑

linux

Using VLANs with VMWare on a Linux Desktop

5 minute read

I enjoy capture the flag competitions, and it’s a good practice to operate in a clean virtual environment. I would like the CTF VM to be in it’s own VLAN, bu...

5Charlie CTF - Escalator

6 minute read

A write-up of the “Escalator” privelege escalation challenge set from 5Charlie CTF.

Unifi CloudKey Gen2 Plus Dual Homing

4 minute read

This is a guide for dual-homing a CKV2P this is currently operating in a configuration where the device operates in a single subnet for both Unifi Network Co...

5Charlie CTF - Odyssey

4 minute read

A write-up of the “Odyssey” container memory export forensic analysis challenge from 5Charlie CTF.

5Charlie CTF - Evasion

3 minute read

A write-up of the Aperture Linux live system forensics challenge from 5Charlie CTF.

5Charlie CTF - Aperture

4 minute read

A write-up of the Aperture Linux live system forensics challenge from 5Charlie CTF.

Back to Top ↑

network

5Charlie CTF - Exfil - MD5

less than 1 minute read

A write-up of the “MD5” network covert-channel pcap analysis challenge from 5Charlie CTF.

Back to Top ↑

covert-channel

5Charlie CTF - Exfil - MD5

less than 1 minute read

A write-up of the “MD5” network covert-channel pcap analysis challenge from 5Charlie CTF.

Back to Top ↑

networking

Using VLANs with VMWare on a Linux Desktop

5 minute read

I enjoy capture the flag competitions, and it’s a good practice to operate in a clean virtual environment. I would like the CTF VM to be in it’s own VLAN, bu...

Unifi CloudKey Gen2 Plus Dual Homing

4 minute read

This is a guide for dual-homing a CKV2P this is currently operating in a configuration where the device operates in a single subnet for both Unifi Network Co...

Back to Top ↑

hacking

5Charlie CTF - Escalator

6 minute read

A write-up of the “Escalator” privelege escalation challenge set from 5Charlie CTF.

Back to Top ↑

forensics

5Charlie CTF - Odyssey

4 minute read

A write-up of the “Odyssey” container memory export forensic analysis challenge from 5Charlie CTF.

5Charlie CTF - Evasion

3 minute read

A write-up of the Aperture Linux live system forensics challenge from 5Charlie CTF.

5Charlie CTF - Aperture

4 minute read

A write-up of the Aperture Linux live system forensics challenge from 5Charlie CTF.

5Charlie CTF - 0day

7 minute read

A write-up of the 0day Windows memory forensics challenge from 5Charlie CTF.

Back to Top ↑

ipv6

Back to Top ↑

miscellaneous

5Charlie CTF - Blackjack

3 minute read

A write-up of the Blackjack Python application security challenge from 5Charlie CTF.

Back to Top ↑

secure-coding

5Charlie CTF - Blackjack

3 minute read

A write-up of the Blackjack Python application security challenge from 5Charlie CTF.

Back to Top ↑

steganography

5Charlie CTF - MP3 - Pop

less than 1 minute read

A write-up of the “Pop” audio steganography challenge from 5Charlie CTF.

5Charlie CTF - BMP

1 minute read

A write-up of the BMP image steganography challenge from 5Charlie CTF.

Back to Top ↑

cracking

Back to Top ↑

reverse-engineering

5Charlie CTF - Easy Too

2 minute read

A write-up of the “Easy Too” reverse engineering challenge from 5Charlie CTF.

5Charlie CTF - Myste-RE

less than 1 minute read

A write-up of the “Myste-RE” reverse-engineering challenge from 5Charlie CTF.

Back to Top ↑

pivoting

Back to Top ↑

volatility

5Charlie CTF - 0day

7 minute read

A write-up of the 0day Windows memory forensics challenge from 5Charlie CTF.

Back to Top ↑

windows

5Charlie CTF - 0day

7 minute read

A write-up of the 0day Windows memory forensics challenge from 5Charlie CTF.

Back to Top ↑

elastic

Back to Top ↑

devops

5Charlie CTF - Odyssey

4 minute read

A write-up of the “Odyssey” container memory export forensic analysis challenge from 5Charlie CTF.

Back to Top ↑

docker

5Charlie CTF - Odyssey

4 minute read

A write-up of the “Odyssey” container memory export forensic analysis challenge from 5Charlie CTF.

Back to Top ↑

troubleshooting

Back to Top ↑

dhcpv6

Back to Top ↑

vlan

Unifi CloudKey Gen2 Plus Dual Homing

4 minute read

This is a guide for dual-homing a CKV2P this is currently operating in a configuration where the device operates in a single subnet for both Unifi Network Co...

Back to Top ↑

unifi

Unifi CloudKey Gen2 Plus Dual Homing

4 minute read

This is a guide for dual-homing a CKV2P this is currently operating in a configuration where the device operates in a single subnet for both Unifi Network Co...

Back to Top ↑

ubiquiti

Unifi CloudKey Gen2 Plus Dual Homing

4 minute read

This is a guide for dual-homing a CKV2P this is currently operating in a configuration where the device operates in a single subnet for both Unifi Network Co...

Back to Top ↑

database

Back to Top ↑

sqli

Back to Top ↑

arm

5Charlie CTF - Easy Too

2 minute read

A write-up of the “Easy Too” reverse engineering challenge from 5Charlie CTF.

Back to Top ↑

angr

5Charlie CTF - Easy Too

2 minute read

A write-up of the “Easy Too” reverse engineering challenge from 5Charlie CTF.

Back to Top ↑

privesc

5Charlie CTF - Escalator

6 minute read

A write-up of the “Escalator” privelege escalation challenge set from 5Charlie CTF.

Back to Top ↑

vmware

Using VLANs with VMWare on a Linux Desktop

5 minute read

I enjoy capture the flag competitions, and it’s a good practice to operate in a clean virtual environment. I would like the CTF VM to be in it’s own VLAN, bu...

Back to Top ↑

vlans

Using VLANs with VMWare on a Linux Desktop

5 minute read

I enjoy capture the flag competitions, and it’s a good practice to operate in a clean virtual environment. I would like the CTF VM to be in it’s own VLAN, bu...

Back to Top ↑

virtualization

Using VLANs with VMWare on a Linux Desktop

5 minute read

I enjoy capture the flag competitions, and it’s a good practice to operate in a clean virtual environment. I would like the CTF VM to be in it’s own VLAN, bu...

Back to Top ↑

systemd

Using VLANs with VMWare on a Linux Desktop

5 minute read

I enjoy capture the flag competitions, and it’s a good practice to operate in a clean virtual environment. I would like the CTF VM to be in it’s own VLAN, bu...

Back to Top ↑

encoding

Back to Top ↑

encryption

Back to Top ↑