Have you ever had the problem that your Nextcloud-Server stuck in the maintenance mode? For example if you just wanted to finish your update using…
In my article from August 2018 I wrote about a new phase in life, the completion of my studies and the start of a new…
It has been a long time since the first part of this host from Vulnhub. I apologize, I have simply forgot it. With this post, I want to finish the walkthrough of this host. The first part ended with the password of Luigi. The next obvious step is to connect to the host over
ssh using the found password.
It has been a long time since the last post. And a lot has changed since then! I have finished my studies, started a new job and got Offensive Security Certified Professional (OSCP). But let me start from about a year ago.
In this post I want to show how I assembled a little hacking gadget using a Raspberry Pi Zero W and the software of P4wnP1. This project is based on the two projects from P4wnP1 and Novaspirit. Please notice that this is for educational use only! Do not use it in the wild!
What you need:
- Raspberry Pi Zero W
- Micro-SD card
- Latest version of Raspbian (Lite version is sufficient)
- P4wnP1 Software
- Some wires
- USB male head
- Case for Raspberry Pi Zero W
- Soldering equipment
This post covers the second part of the Game of Thrones CTF 1 walkthrough. In the first part I have already found the first two kingdom flags and one secret flag:
This post covers the first part of the Game of Thrones CTF 1 provided by Vulnhub. The CTF contains 11 flags in total (7 kingdom flags, 3 secret flags and one battle flag). The flags will be a md5 hash.
Please notice that this walkthrough might contain SPOILER to the actual series and as usual, if you have not solved this challenge yet, then try it first on your own!
In this post I want to show you another walkthrough of a Vulnhub machine. This time it is the Super Mario Host which can be found here. As always, if you haven’t solved this challenge yet, I hardly suggest that you first try it by yourself and consult this post as a reference.
I finally managed to solve the last part of this CTF challenge. If you have not read the first two parts, you can find them here (Part1, Part2). So let me now continue with the last part. As always, ***SPOILER ALERT***
We left the second part with root privileges on the puppet machine and the first flag in folder