Problem FoundThis is a quick blog about an issue I faced with my VMware VM. Most of the time, I found that my VM can’t connect to WiFi (the ethernet connection shows up in the VM). After some inves...
First WeekProtoVault Breach Determine if the leak could have come from the application. Review the database connection string to ensure it is secure. Submit the connection string here. postgresql...
Executive SummaryThis is a Hack The Box machine writeup for Outbound. In this machine, I used nmap to discover details about the target IP address, identified a CVE affecting the Roundcube webmail...
Arm-Malaysia On Demand TrainingDay 1Introduction to ARMARM stands for Advanced RISC Machine, a family of computer processors that are widely used in mobile devices, embedded systems, and increasing...
What is Frida?Frida is a toolkit that enables dynamic interaction with running programs. Installing Frida1pip install frida-tools Then test the installation: 1frida --version Next, match your devic...
IntroductionDuring a routine security intelligence exchange with my senior Ann from CyberX, I received a suspicious Android application package (APK) for analysis. The sample, disguised as a legiti...
🔗 Check Out Our Website👉 UMCS CTF Blog 📄 CTF Preliminary Round Writeup This browser does not support PDF viewing. You can download the writeup here. ✍️ Writeup CreditsThis writeup is com...
WebNotePad Online First, start the machine and sign in to the ip address and email+password given. Have a look in the url, we can see the url have id=1. Lets have a try to increase the number ...
MiscJoin Our Discord Just join the discord and there is the flag on the annoucment channel RVFDVEZ7VzNsQzBtM19UMF9FcXVpbGlicml1bV9EMXNjMHJkfQ==cyberchef it and get the flag EQCTF{W3lC0m3_T0_Eq...
ForensicsForensic Odyssey 1: A Message in the Mist First, we downlaod and unzip the Artifact.zip file with the password given by the challenge. Inspect what inside the file. There is only a file n...