ftp Complete Tutorial in 10 Examples – Must-know Command for CTF
Learn FTP in 10 simple examples, from connecting to uploading and downloading files. See how hackers steal FTP password and what are the secure alternatives
Learn FTP in 10 simple examples, from connecting to uploading and downloading files. See how hackers steal FTP password and what are the secure alternatives
Practical netcat (nc) guide for Linux: reverse shells, TCP/UDP connections, port scanning, file transfers, and key options for CTF and Pentesting.
Master nmap with thist tutorial, from basic host discovery, port and service scanning to more advanced techniques like firewall evasion
Complete walkthrough of Lookup room on TryHackMe: form brute-forcing, elFinder CVE and 2 Linux misconfigurations lead us to the root flag.
Full walkthrough of the TryHackMe Basic Pentesting room: web enumeration, SMB usernames, SSH access and SSH private key brute-force.
Full walkthrough of RootMe: reconnaissance, getting a PHP shell then a reverse shell, and elevating our privileges through a SUID misconfiguration
Full walkthrough of the Corridor Challenge on TryHackMe. We find the flag by exploiting IDOR through a MD5 id in the URL of the web app.
This writeup covers the solution of Lo-Fi room on TryHackMe. A PHP File Inclusion along with path traversal allow us to read the flag.
Full writeup of TakeOver from TryHackMe. Subdomain enumeration and TLS certificate inspection leads to the discovery of a secret subdomain
Writeup of TryHackMe challenge “Agent T”. We exploit the backdoored version of PHP 8.1.0-dev to get Code Execution and read the flag.