Main public logs
From Pessin randon wiki
Combined display of all available logs of Pessin randon wiki. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
- 10:49, 30 September 2022 Exf talk contribs created page Hacked (Created page with "===Description=== This web server was defaced by hackers. They made some modification on the system. ===Question=== Admin was able to see from the logs that a SQL database dump was made. Can you find it? Maybe this helps you forward with this incident analysis. ===Solution=== Since we were asked to search for SLQ database dump it makes sense to use gobuster here as well. The command <code>gobuster dir -u [url] -w /usr/share/wordlist/dirbuster/directory-list-2.3-medium....")
- 10:40, 30 September 2022 Exf talk contribs created page File:Three-hils-zap.PNG
- 10:40, 30 September 2022 Exf talk contribs uploaded File:Three-hils-zap.PNG
- 10:40, 30 September 2022 Exf talk contribs created page File:Tree-hills-task+flag.PNG
- 10:40, 30 September 2022 Exf talk contribs uploaded File:Tree-hills-task+flag.PNG
- 10:40, 30 September 2022 Exf talk contribs created page The Tree Hills (Created page with "===Description=== The Tree Hills is worried that some of their data might have been leaked. They need your help to check it out. 100pts ===Question=== Find the flag from /etc/passwd ===Solution=== This was a really straightforward flag, as using the OWASPZAP tool you got a direct response with its auto-attack. ===Tools=== * ZAP ===Flag=== <code>ctftech{d60bac914-4209}</code> ===Links=== * Back to CTF Challenges page")
- 10:35, 30 September 2022 Exf talk contribs created page File:Healt-check Flag.PNG
- 10:35, 30 September 2022 Exf talk contribs uploaded File:Healt-check Flag.PNG
- 10:35, 30 September 2022 Exf talk contribs created page File:Healt-check Gobuster.PNG
- 10:35, 30 September 2022 Exf talk contribs uploaded File:Healt-check Gobuster.PNG
- 10:35, 30 September 2022 Exf talk contribs created page File:Task-healt check.PNG
- 10:35, 30 September 2022 Exf talk contribs uploaded File:Task-healt check.PNG
- 10:34, 30 September 2022 Exf talk contribs created page File:Webpage.PNG
- 10:34, 30 September 2022 Exf talk contribs uploaded File:Webpage.PNG
- 10:25, 30 September 2022 Exf talk contribs created page Health check (Created page with "===Description=== This is a healt care systems web page where you can upload your certificates for verification. 100pts ===Question=== Investigate the application, find if there are any vulnerabilities and read the flag from /var/backup/secret.txt ===Solution=== I first tested how the website works and found that you can upload .php files. I then tried using the gobuster application to find the file I had sent and found that it was sent directly to the root folder of the...")
- 09:58, 30 September 2022 Exf talk contribs created page File:Cat-automata.PNG
- 09:58, 30 September 2022 Exf talk contribs uploaded File:Cat-automata.PNG
- 09:58, 30 September 2022 Exf talk contribs created page File:Automata-flag.PNG
- 09:58, 30 September 2022 Exf talk contribs uploaded File:Automata-flag.PNG
- 09:58, 30 September 2022 Exf talk contribs created page File:Task-automata.PNG
- 09:58, 30 September 2022 Exf talk contribs uploaded File:Task-automata.PNG
- 09:57, 30 September 2022 Exf talk contribs created page Automata (Created page with "===Description=== I found a broken old machine in my basement. Can you help me reassemble it? 100Pts ===Question=== Take a look at these odd parts and see if you can make sense of them. ===Solution=== First, I downloaded the file to a virtual machine. The file was a Zip file. When I extracted the zip file, three files came up. Files what was in zip file # automation_matrix # clunky_gizmo # long_apparatus I took a look at the contents of the files and found that they ap...")
- 12:43, 26 September 2022 Exf talk contribs created page SSH brute (Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page")
- 12:43, 26 September 2022 Exf talk contribs created page Zip brute (Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page")
- 12:43, 26 September 2022 Exf talk contribs created page Web login brute (Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page")
- 12:43, 26 September 2022 Exf talk contribs created page Basic auth brute (Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page")
- 12:43, 26 September 2022 Exf talk contribs created page FTP exploit (Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page")
- 12:43, 26 September 2022 Exf talk contribs created page Pcap extract (Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page")
- 12:43, 26 September 2022 Exf talk contribs created page Shellshock exploit (Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page")
- 12:43, 26 September 2022 Exf talk contribs created page PHPMailer exploit (Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page")
- 12:43, 26 September 2022 Exf talk contribs created page Scanning 2 (Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page")
- 12:43, 26 September 2022 Exf talk contribs created page Range (Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page")
- 12:43, 26 September 2022 Exf talk contribs created page Metadata (Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page")
- 12:43, 26 September 2022 Exf talk contribs created page Pump clicker (Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page")
- 12:43, 26 September 2022 Exf talk contribs created page Upload (Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page")
- 12:43, 26 September 2022 Exf talk contribs created page Ping (Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page")
- 12:42, 26 September 2022 Exf talk contribs created page Blog (Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page")
- 12:42, 26 September 2022 Exf talk contribs created page User audit (Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page") Tag: Visual edit: Switched
- 12:12, 26 September 2022 Exf talk contribs created page File:Unknown-file.PNG
- 12:12, 26 September 2022 Exf talk contribs uploaded File:Unknown-file.PNG
- 12:11, 26 September 2022 Exf talk contribs created page Unknown file (Created page with "===Description=== On linux, quite often you will see files without any extensions. You must find out what kind of files they are so that you can choose appropriate tools to use on them. 50pts ===Question=== Inspect this file and get the flag <code>/var/unknown/file</code> ===Solution=== First, I go to the folder where the file is located using the <code>cd</code> command. Next, I examine which file it is using the <code>file</code> command. I find out that the file is <...") Tag: Visual edit: Switched
- 12:03, 26 September 2022 Exf talk contribs created page File:Compressed.PNG
- 12:03, 26 September 2022 Exf talk contribs uploaded File:Compressed.PNG
- 12:03, 26 September 2022 Exf talk contribs created page Compressed (Created page with "===Description=== Often the files you need from the internet or other sources come in a compressed format. There are many tools available and most of them have slightly different syntax for unpacking. How to find information on unpacking different formats is a mandatory knowledge. 50pts ===Question=== Unpack all the files in the folder <code>/var/compressed/</code> and retrieve the flag. ===Solution=== First, go to the folder where the files to be extracted are. See wh...") Tag: Visual edit: Switched
- 11:48, 26 September 2022 Exf talk contribs created page File:Inside.PNG
- 11:48, 26 September 2022 Exf talk contribs uploaded File:Inside.PNG
- 11:48, 26 September 2022 Exf talk contribs created page Inside (Created page with "===Description=== Sometimes you only know the contents of the file but not the location or name. 50pts ===Question=== Find a file from the system that has following line in it <code>The cake is a lie</code> It is located inn one of the subfolders of <code>/usr/</code> ===Solution=== With <code>grep</code> tool you can find strings inside files. Lets use <code>grep -r "The cake is a lie" /urs/</code> ===Tools=== *grep ===Flag=== <code>ctf-tech{f62cf6d8-f27f}</code> ===...") Tag: Visual edit: Switched
- 11:44, 26 September 2022 Exf talk contribs created page File:Find-me.PNG
- 11:44, 26 September 2022 Exf talk contribs uploaded File:Find-me.PNG
- 11:44, 26 September 2022 Exf talk contribs created page Find-me (Created page with "===Description=== Sometimes you only know the filename but not the location. 50pts ===Question=== Find a file from the system that is named <code>find-flag.txt</code> It is located in one of the subfolders of <code>/etc/</code> ===Solution=== We can use tool called <code>find</code> to find the file. <code>find /etc/ -name find-flag.txt</code> With this we get the file location. Then we can just print the contents of the file out to the screen with <code>cat /etc/tool...")