User contributions for Exf
From Pessin randon wiki
30 September 2022
- 10:4310:43, 30 September 2022 diff hist +20 CTF Challenges →WEB
- 10:4110:41, 30 September 2022 diff hist +103 The Tree Hills No edit summary current Tag: Visual edit
- 10:4010:40, 30 September 2022 diff hist 0 N File:Three-hils-zap.PNG No edit summary current
- 10:4010:40, 30 September 2022 diff hist 0 N File:Tree-hills-task+flag.PNG No edit summary current
- 10:4010:40, 30 September 2022 diff hist +441 N The Tree Hills Created page with "===Description=== The Tree Hills is worried that some of their data might have been leaked. They need your help to check it out. 100pts ===Question=== Find the flag from /etc/passwd ===Solution=== This was a really straightforward flag, as using the OWASPZAP tool you got a direct response with its auto-attack. ===Tools=== * ZAP ===Flag=== <code>ctftech{d60bac914-4209}</code> ===Links=== * Back to CTF Challenges page"
- 10:3810:38, 30 September 2022 diff hist −1 CTF Challenges →CYBER BATTLE OF ESTONIA 2022 - QUALIFICATION
- 10:3710:37, 30 September 2022 diff hist +30 CTF Challenges →WEB
- 10:3710:37, 30 September 2022 diff hist +264 Health check No edit summary current Tag: Visual edit
- 10:3510:35, 30 September 2022 diff hist 0 N File:Healt-check Flag.PNG No edit summary current
- 10:3510:35, 30 September 2022 diff hist 0 N File:Healt-check Gobuster.PNG No edit summary current
- 10:3510:35, 30 September 2022 diff hist 0 N File:Task-healt check.PNG No edit summary current
- 10:3410:34, 30 September 2022 diff hist 0 N File:Webpage.PNG No edit summary current
- 10:2510:25, 30 September 2022 diff hist +931 N Health check Created page with "===Description=== This is a healt care systems web page where you can upload your certificates for verification. 100pts ===Question=== Investigate the application, find if there are any vulnerabilities and read the flag from /var/backup/secret.txt ===Solution=== I first tested how the website works and found that you can upload .php files. I then tried using the gobuster application to find the file I had sent and found that it was sent directly to the root folder of the..."
- 10:0010:00, 30 September 2022 diff hist +25 CTF Challenges →CYBER BATTLE OF ESTONIA 2022 - QUALIFICATION
- 10:0010:00, 30 September 2022 diff hist +47 Automata No edit summary current Tag: Visual edit
- 09:5909:59, 30 September 2022 diff hist +92 Automata No edit summary Tag: Visual edit: Switched
- 09:5809:58, 30 September 2022 diff hist 0 N File:Cat-automata.PNG No edit summary current
- 09:5809:58, 30 September 2022 diff hist 0 N File:Automata-flag.PNG No edit summary current
- 09:5809:58, 30 September 2022 diff hist 0 N File:Task-automata.PNG No edit summary current
- 09:5809:58, 30 September 2022 diff hist +7 Automata No edit summary
- 09:5709:57, 30 September 2022 diff hist +1,383 N Automata Created page with "===Description=== I found a broken old machine in my basement. Can you help me reassemble it? 100Pts ===Question=== Take a look at these odd parts and see if you can make sense of them. ===Solution=== First, I downloaded the file to a virtual machine. The file was a Zip file. When I extracted the zip file, three files came up. Files what was in zip file # automation_matrix # clunky_gizmo # long_apparatus I took a look at the contents of the files and found that they ap..."
- 09:4309:43, 30 September 2022 diff hist +22 CTF Challenges →Linux
- 07:0607:06, 30 September 2022 diff hist +252 CTF Challenges No edit summary
26 September 2022
- 12:4312:43, 26 September 2022 diff hist +137 N SSH brute Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page" current
- 12:4312:43, 26 September 2022 diff hist +137 N Zip brute Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page" current
- 12:4312:43, 26 September 2022 diff hist +137 N Web login brute Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page" current
- 12:4312:43, 26 September 2022 diff hist +137 N Basic auth brute Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page" current
- 12:4312:43, 26 September 2022 diff hist +137 N FTP exploit Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page" current
- 12:4312:43, 26 September 2022 diff hist +137 N Pcap extract Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page" current
- 12:4312:43, 26 September 2022 diff hist +137 N Shellshock exploit Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page" current
- 12:4312:43, 26 September 2022 diff hist +137 N PHPMailer exploit Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page" current
- 12:4312:43, 26 September 2022 diff hist +137 N Scanning 2 Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page" current
- 12:4312:43, 26 September 2022 diff hist +137 N Range Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page" current
- 12:4312:43, 26 September 2022 diff hist +137 N Metadata Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page" current
- 12:4312:43, 26 September 2022 diff hist +137 N Pump clicker Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page" current
- 12:4312:43, 26 September 2022 diff hist +137 N Upload Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page" current
- 12:4312:43, 26 September 2022 diff hist +137 N Ping Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page" current
- 12:4212:42, 26 September 2022 diff hist +137 N Blog Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page"
- 12:4212:42, 26 September 2022 diff hist +137 N User audit Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page" Tag: Visual edit: Switched
- 12:1212:12, 26 September 2022 diff hist +46 Unknown file No edit summary current Tag: Visual edit
- 12:1212:12, 26 September 2022 diff hist 0 N File:Unknown-file.PNG No edit summary current
- 12:1112:11, 26 September 2022 diff hist +1,159 N Unknown file Created page with "===Description=== On linux, quite often you will see files without any extensions. You must find out what kind of files they are so that you can choose appropriate tools to use on them. 50pts ===Question=== Inspect this file and get the flag <code>/var/unknown/file</code> ===Solution=== First, I go to the folder where the file is located using the <code>cd</code> command. Next, I examine which file it is using the <code>file</code> command. I find out that the file is <..." Tag: Visual edit: Switched
- 12:0312:03, 26 September 2022 diff hist +42 Compressed No edit summary current Tag: Visual edit
- 12:0312:03, 26 September 2022 diff hist 0 N File:Compressed.PNG No edit summary current
- 12:0312:03, 26 September 2022 diff hist +1,333 N Compressed Created page with "===Description=== Often the files you need from the internet or other sources come in a compressed format. There are many tools available and most of them have slightly different syntax for unpacking. How to find information on unpacking different formats is a mandatory knowledge. 50pts ===Question=== Unpack all the files in the folder <code>/var/compressed/</code> and retrieve the flag. ===Solution=== First, go to the folder where the files to be extracted are. See wh..." Tag: Visual edit: Switched
- 11:4911:49, 26 September 2022 diff hist +34 Inside No edit summary current Tag: Visual edit
- 11:4811:48, 26 September 2022 diff hist 0 N File:Inside.PNG No edit summary current
- 11:4811:48, 26 September 2022 diff hist +533 N Inside Created page with "===Description=== Sometimes you only know the contents of the file but not the location or name. 50pts ===Question=== Find a file from the system that has following line in it <code>The cake is a lie</code> It is located inn one of the subfolders of <code>/usr/</code> ===Solution=== With <code>grep</code> tool you can find strings inside files. Lets use <code>grep -r "The cake is a lie" /urs/</code> ===Tools=== *grep ===Flag=== <code>ctf-tech{f62cf6d8-f27f}</code> ===..." Tag: Visual edit: Switched
- 11:4511:45, 26 September 2022 diff hist +36 Find-me No edit summary current Tag: Visual edit
- 11:4411:44, 26 September 2022 diff hist 0 N File:Find-me.PNG No edit summary current