Category: CTF Challenges

  • HTML Injection (GET Method) from Low to High Bypassing via encoding

    HTML Injection (GET Method) from Low to High Bypassing via encoding

    HTML Injection is a browser based attack. It had nothing to do with the server but it takes victim as the client.In this attack, the web application can be injected with malicious html code by the attacker, changing the outlook of the web application so as to gain confidential information from the user, using that…

  • Capture the Flag: CTF challenges for Hackers and their Walkthroughs

    Capture the Flag: CTF challenges for Hackers and their Walkthroughs

    This article is a collection of all the CTFs challenges that I have done on my site with my Walkthrough solutions. Providing the click where you can download them and try them yourself without first looking at the solution. Vulnix CTF: Walkthrough Post Link : Download VM Link SkyTower CTF : Walkthrough Post Link: Download VM…

  • Part 1: Finding the IP address of your Victim in your VirtualBox Hacking Lab Network

    Part 1: Finding the IP address of your Victim in your VirtualBox Hacking Lab Network

    This article will give you ways to find the ip address of the vulnerable /victim machine in your hacking lab environment in your network. A reader of my blog recently asked me to write about CTF challenges from very basics. I am really glad to get a suggestion. So, here is what you asked for.…

  • Vulnix Vulnerable VM CTF: Walkthrough

    Vulnix Vulnerable VM CTF: Walkthrough

    This article is a walkthrough on vulnix CTF challenge. You can get this on Vulnhub website: here is the link. Vulnix is a specially made vulnerable virtual machine of SSH and NFS [Network file system]. Vulnix will guide you on how false configuration of NFS can be used to escalate privileges on the system. Let’s…

  • OVERTHEWIRE:BANDIT WALKTHROUGH SERIES LEVEL 26

    OVERTHEWIRE:BANDIT WALKTHROUGH SERIES LEVEL 26

    Login as bandit25 with the password we obtained in the http://www.anonhack.in/?p=1347 The hint for this level says: Logging in to bandit26 from bandit25 should be fairly easy… The shell for user bandit26 is not /bin/bash, but something else. Find out what it is, how it works and how to break out of it. This is a…

  • OVERTHEWIRE:BANDIT WALKTHROUGH SERIES 23-25 LEVELS

    OVERTHEWIRE:BANDIT WALKTHROUGH SERIES 23-25 LEVELS

    This is overthewire series with bandit walkthrough from level 23 – 26. If you haven’t gone through the previous articles on OVERTHEWIRE Bandit then follow the links below! http://www.anonhack.in/2018/04/overthewire-bandit-walkthrough-series/ http://www.anonhack.in/2018/04/overthewirebandit-walkthrough-series-6-10-levels/ http://www.anonhack.in/2018/04/overthewirebandit-walkthrough-series-12-15-levels/ http://www.anonhack.in/2018/04/overthewirebandit-walkthrough-series-15-18-levels/ Level 22 – 23 Login into bandit22 with the password we obtained in the article above. The hint for this level says: A…

  • OVERTHEWIRE:BANDIT WALKTHROUGH SERIES 19-22 LEVELS

    OVERTHEWIRE:BANDIT WALKTHROUGH SERIES 19-22 LEVELS

    This article will guide you through the OVERTHEWIRE Bandit level 19-23. The OVERTHEWIRE BANDIT levels make you understand the basic functionalities of linux operating systems and how you can work in that environment. If you didn’t see my past posts of overthewire series, Here are the links to those posts: http://www.anonhack.in/2018/04/overthewire-bandit-walkthrough-series/ http://www.anonhack.in/2018/04/overthewirebandit-walkthrough-series-6-10-levels/ http://www.anonhack.in/2018/04/overthewirebandit-walkthrough-series-12-15-levels/ http://www.anonhack.in/2018/04/overthewirebandit-walkthrough-series-15-18-levels/  …

  • SkyTower CTF Walkthrough

    SkyTower CTF Walkthrough

    The following article is a walkthrough for Skytower Vulnerable machine. This machine is a web application Capture the flag machine. This machine is filtered and an appropriate methodology is required here. Objectives: Obtain the flag.txt file from /root/ So let’s dive: Tools: Virtual Machine or VMware Kali OS I located the skytower vulnhub’s IP address…

  • OVERTHEWIRE:BANDIT WALKTHROUGH SERIES 16-18 LEVELS

    OVERTHEWIRE:BANDIT WALKTHROUGH SERIES 16-18 LEVELS

    This article is the continuation of the Over The Wire Bandit walkthrough. In case,you haven’t seen my last article it is here OVERTHEWIRE: Bandit walkthough 12-15. So let’s begin with the further levels. LEVEL 16-17: Login with the bandit16 user with the password. The hint of this level says The credentials for the next level…

  • OVERTHEWIRE:BANDIT WALKTHROUGH SERIES 12-15 LEVELS

    OVERTHEWIRE:BANDIT WALKTHROUGH SERIES 12-15 LEVELS

    This article is the continuation of my previous article OVERTHEWIRE: BANDIT WALKTHROUGH SERIES 5-12 LEVELS. Over the wire level 12-15 are quite different from other levels. They mostly talk about usage of different services. They are hard if you did not know what you are doing. Let’s start: LEVEL 12-13: Login using command: ssh bandit12@bandit.labs.overthewire.org -p…

  • OVERTHEWIRE:BANDIT WALKTHROUGH SERIES 5-12 LEVELS

    OVERTHEWIRE:BANDIT WALKTHROUGH SERIES 5-12 LEVELS

    This article is continuation of the over the wire bandit series. In case you haven’t read that here it is OVERTHEWIRE:BANDIT WALKTHROUGH SERIES 1-5 LEVELS. So let’s start with the level 6. I logged in level 6 with the credentials I gained in level 5. > level 5-6 ssh bandit5@bandit.labs.overthewire.org -p 2220 password: Level 4-5 password…

  • Overthewire:Bandit walkthrough Series 1-5 Levels

    Overthewire:Bandit walkthrough Series 1-5 Levels

      The following post is a walkthrough for Overthewire bandit challenge.The bandit challenge of overthewire is based on linux commands. These challenges will guide you on how to deal with different files in a linux environment. Bandit contains 26 levels and this article is a series of 1 – 5 levels. > Level 0 -1:…