This post covers the third and last part of the walkthrough of the Game of Thrones CTF 1 provided by Vulnhub. You can find the first and second part here and here. In the first two parts I have already found 5 kingdom flags and 1 secret flag.
Tag: ethnical hacking
In this post I want to show how I assembled a little hacking gadget using a Raspberry Pi Zero W and the software of P4wnP1. This project is based on the two projects from P4wnP1 and Novaspirit. Please notice that this is for educational use only! Do not use it in the wild!
What you need:
- Raspberry Pi Zero W
- Micro-SD card
- Latest version of Raspbian (Lite version is sufficient)
- P4wnP1 Software
- Some wires
- USB male head
- Case for Raspberry Pi Zero W
- Soldering equipment
This post covers the second part of the Game of Thrones CTF 1 walkthrough. In the first part I have already found the first two kingdom flags and one secret flag:
Kingdom Flags
Dorne: fb8d98be1265dd88bac522e1b2182140
Winterfell: 639bae9ac6b3e1a84cebb7b403297b79
Secret Flag
Savages: 8bf8854bebe108183caeb845c7676ae4
This post covers the first part of the Game of Thrones CTF 1 provided by Vulnhub. The CTF contains 11 flags in total (7 kingdom flags, 3 secret flags and one battle flag). The flags will be a md5 hash.
Please notice that this walkthrough might contain SPOILER to the actual series and as usual, if you have not solved this challenge yet, then try it first on your own!
Hi fellows,
In this post I want to show you another walkthrough of a Vulnhub machine. This time it is the Super Mario Host which can be found here. As always, if you haven’t solved this challenge yet, I hardly suggest that you first try it by yourself and consult this post as a reference.
Hi fellows,
I finally managed to solve the last part of this CTF challenge. If you have not read the first two parts, you can find them here (Part1, Part2). So let me now continue with the last part. As always, ***SPOILER ALERT***
We left the second part with root privileges on the puppet machine and the first flag in folder /root/protovision/
.
Hi fellows,
Welcome to the second part of the Vulnhub Analoguepond 1 walkthrough. If you have missed the first part, you can find it here.
I have finished the last part with finding the troll flag and escalating the privileges on the first machine. So let’s continue finding the other flags… I had some time to find out how to proceed. I examined a lot, especially at the places where we need root privileges, but I found nothing. After a bit, I looked at the network interfaces and found something interesting
Hi
In this post I want to start with a walkthrough of the Vulnhub challenge Analoguepond 1. Since I have not finished this box yet, I will split this walkthrough into several parts. This here is the first part. So lets start.
The first thing I usually do when I start such a challenge is to scan the network in order to find out on which IP address I can find the box. In order to do so I usually use netdiscover
.