Documentation

Writeups

CTF solutions, vulnerability research, and security analysis. Each writeup is a deep dive into real-world attack techniques and defensive strategies.

23 Total
8 Categories
CTF

RootMe

Easy Linux room covering insecure file upload exploitation, a .phtml PHP bypass, Meterpreter shell access, and privilege escalation through a SUID Python binary.

File Upload, SUID, PrivEsc
CVE

n8n CVE-2025-68613

Critical RCE vulnerability in n8n workflow automation platform affecting versions 0.211.0 through 1.120.3, allowing authenticated attackers to execute arbitrary system commands via expression injection.

RCE, Injection, Sigma Rules
AD

SoupeDecode 01

Windows Domain Controller challenge demonstrating RID cycling, password spraying, Kerberoasting, and privilege escalation through computer account compromise and DCSync attacks.

Active Directory, SMB, Kerberos
DFIR

IronShade

Advanced digital forensics and compromise assessment conducting thorough Linux host investigation to identify backdoors, hidden processes, and persistence mechanisms.

Forensics, Malware, Persistence
Web

OWASP Top 10 2025: IAAA Failures

In-depth exploration of OWASP Top 10 2025 categories A01, A07, and A09 focusing on failures in the IAAA security model with practical testing methodologies.

OWASP, Access Control, Auth
Cloud

A Bucket of Phish

Cloud security challenge demonstrating AWS S3 bucket misconfiguration vulnerabilities. Enumerate public bucket contents and retrieve captured credentials.

AWS, S3, Cloud Security
Red Team

Living Off the Land Attacks

Comprehensive analysis of LOL techniques leveraging trusted Windows tools for stealthy attacks. GTFOBins, Sysinternals abuse, PowerShell IEX, and WMI event subscriptions.

LOLBins, PowerShell, WMIC
Hardening

Bulletproof Penguin

Linux server hardening challenge covering Redis authentication, SNMP security, SSH cryptographic hardening, service privilege management, and database exposure control.

Redis, SSH, MySQL, Nginx
Network

Man-in-the-Middle Detection

Comprehensive MITM analysis through network traffic forensics covering ARP spoofing, DNS poisoning, and SSL stripping with Wireshark packet-level analysis.

Wireshark, ARP, DNS, SSL
Blue Team

Detecting Web Attacks

Exploration of web attacks including XSS, SQLi, and detection methods through log and traffic analysis. Directory fuzzing, brute-force, and WAF strategies.

XSS, SQLi, WAF, Logs
Blue Team

Detecting Web DDoS

Exploration of denial-of-service attacks, detection techniques using Splunk log analysis, botnet analysis, traffic pattern identification, and mitigation methods.

DDoS, Splunk, Botnets
Network

Network Traffic Basics

Network traffic analysis fundamentals covering DNS tunneling, HTTP traffic inspection, protocol analysis, and packet-level investigations with practical techniques.

DNS, HTTP, Protocols
OSINT

IP and Domain Threat Intel

IP and domain analysis using open source threat intelligence tools. Domain reconnaissance, IP geolocation, ASN analysis using Shodan, Censys, and RDAP.

Shodan, Censys, WHOIS
OSINT

File and Hash Threat Intel

File and hash analysis using threat intelligence tools covering malware sample investigation, hash-based identification using VirusTotal, MalwareBazaar, and Hybrid Analysis.

VirusTotal, Hashes, Malware
Malware

Malware Classification

Malware identification and classification covering behavioral characteristics, specific malware families, cryptominers, ransomware, spyware, and technical signatures.

Ransomware, Spyware, Analysis
Phishing

The Phishing Pond

Interactive phishing awareness training through 10 progressively challenging scenarios covering suspicious links, spoofing, domain look-alikes, and social engineering.

Email, Spoofing, Social Eng
Tools

Nessus

Comprehensive tutorial on setting up and using Nessus for professional vulnerability scanning, covering scan templates, configuration, and vulnerability detection.

Nessus, Vuln Scanning, Tenable
Dev

Learn Rust

Comprehensive guide to Rust programming through practical exercises covering fundamentals, memory management, ownership, and building secure applications.

Rust, Memory Safety, Systems
CTF

Pickle Rick

Rick and Morty themed CTF involving web server exploitation, command execution bypass, file system exploration, and privilege escalation to find three flags.

Enumeration, PrivEsc, Web
CTF

LazyAdmin

Easy Linux machine demonstrating SweetRice CMS exploitation, web shell access, and privilege escalation through misconfigured sudo permissions.

CMS, Web Shell, Sudo
CTF

Library

Boot2root exploitation featuring SSH brute-forcing with Hydra, privilege escalation via misconfigured sudo, and Python script manipulation via GTFOBins.

Hydra, SSH, GTFOBins
CTF

Thomson

Apache Tomcat exploitation using Ghostcat vulnerability (CVE-2020-1938), WAR file deployment, and privilege escalation through cron job manipulation.

Tomcat, CVE-2020-1938, Cron
CTF

Lo-Fi

Lo-fi beats themed CTF featuring Local File Inclusion exploitation through directory traversal, ffuf fuzzing, and sensitive file disclosure including /etc/passwd.

LFI, ffuf, Traversal