https://www.ppeinecke.de/custom_assets/images/pascal_portrait.webp

Pascal's Blog

THM - Learn - Offensive Pentesting - Blue

TryHackMe - Learn - Offensive Pentesting - Blue Task 1: Recon Scan and learn what exploit this machine is vulnerable to. Please note that this machine does not respond to ping (ICMP) and may take a few minutes to boot up. This room is not meant to be a boot2root CTF, rather, this is an educational series for complete beginners. Professionals will likely get very little out of this room beyond basic practice as the process here is meant to be beginner-focused.

RITSEC CTF - Crypto - Lost In

Crypto - Lost in - writeup description 324c6e597364696f3259725a6f646d673261453d Bingus sent us this encrypted messagen Can you decrypt? writeup this is the message we got: 1 324c6e597364696f3259725a6f646d673261453d this looks to be hex let’s translate that hex string to ascii: 1 2LnYsdio2YrZodmg2aE= The = at the end most probably means that this is base64 If I try to decode this from base64 I get this: 1 عربي١٠١ this is Arabic. Once I try to use google translate to translate this to English I get this:

RITSEC CTF - Misc - Stegwalk

Misc - Stegwalk - writeup description We found these files in storage. We think there might be something more to one of these featuredImages. Good luck! writeup Ok so I first downloaded the file ‘StegWalk.zip’ Let’s move it for our convenience. 1 mv ~/Downloads/StegWalk.zip . I am going to extract the file first 1 unzip StegWalk.zip -d StegWalk Inside this zip archive are a dozen of .png files … Most of these featuredImage files just say ‘Nothing’.

RITSEC CTF - Misc - Scrumptions Snacks

Misc - Scrumptions Snacks - writeup description Sheamus the STEGOsaurus is hungry! He’s somewhat secretive about his favorite snack spot, but he’ll gladly share his secret if you say the word: “lunch”. Can you identify the name of Sheamus’ favorite food establishment? writeup So I first downloaded the file ‘stegosaurus.jpg’. Let’s see what we have here: 1 mv ~/Downloads/stegosaurus.jpg . 1 2 file stegosaurus.jpg stegosaurus.jpg: JPEG featuredImage data, JFIF standard 1.

picoCTF - Web Exploitation - SQLiLite

Web Exploitation - SQLiLite - writeup description Can you login to this website? Try to login here. writeup Once i visit the website http://saturn.picoctf.net:60431/ in firefox I can see a login form with a username and a password field. My first attempt was to use the username ‘admin’ and try a basic sql injection. So I input in the username field this: 1 admin'-- the single quote is here to end the input of the text box.

picoCTF - Web Exploitation - SQL Direct

Web Exploitation - SQL Direct - writeup description Connect to this PostgreSQL server and find the flag! psql -h saturn.picoctf.net -p 49248 -U postgres pico Password is postgres writeup Ok let’s first connect to the database server: 1 psql -h saturn.picoctf.net -p 49248 -U postgres pico the password is ‘postgres’ Let’s list all databases first 1 2 3 4 5 6 7 8 9 10 11 pico=# \l List of databases Name | Owner | Encoding | Collate | Ctype | Access privileges -----------+----------+----------+------------+------------+----------------------- pico | postgres | UTF8 | en_US.