#CTFs

2025-06-02

We released new Pwndbg: github.com/pwndbg/pwndbg/relea !

Among others it brings:
- New & improved kernel debugging commands (buddydump, msr, slab) and more x64 regs in context
- New command for dealing with armcm exceptions: dump-register-frame
- Disasm now shows an โœ˜ marker for emulated branches we know won't be taken
- Improved disasm for ARM, MIPS and LoongArch64 architectures
- Initial support for the IBM s390x architecture
- IDA sync integration fixes

And also cool portable one-liner installers:
$ curl -qsL 'install.pwndbg.re' | sh -s -- -t pwndbg-gdb
$ curl -qsL 'install.pwndbg.re' | sh -s -- -t pwndbg-lldb

Want to support us? Sponsor us at github.com/sponsors/pwndbg !

#pwning #gdb #ctfs #lldb #security #ctf #pwndbg

Ricardo Alvesopqam
2024-12-31

Here's 10 Reasons *Not* to do LeetCode

In my latest blog post, I break down why LeetCode isnโ€™t for everyone, and might even be for you.

Lifting the veil:

๐Ÿ” Career Alignment
โณ Time and relevancy
๐Ÿง  Mental bandwidth
๐Ÿ’ก How to showcase your real skills
๐ŸŽฎ Alternatives
โšก Burnout is real

๐Ÿ‘‰ Find out more here: dreaming-of-dragons.blogspot.c

Packet-lost soulrek2@hispagatos.space
2024-12-13

Windows hard box from #hackthebox I am playing catch up because busy with work this box took me 5-6 days to do, but it was a refresh of some windows priv escalation techniques that is always welcome! FUN #HappyHacking #HTB #CTF #Hispagatos find us on #usenet alt.2600.madrid #hispagatos.talk hackthebox.com/achievement/mac #hackingisnotacrime #Hackers #Hacking #CTFs

cryptaxcryptax
2024-07-19

Last Saturday, I went to Sophia Hacker Lab, in Sophia Antipolis for and barbecue. I was impressed by the lab, with tons of equipment and we played a The Box.

If you're looking for a place to play CTFs, share knowledge and learn, go to shl.contact and attend one of their events. It's really worth it.

2024-01-08

OWASP Juicy Shop โ€“ Score Board Challenge
Some time ago we explained how to install the OWASP Juicy Shop.

This first post of 2024 will explain how to start with this nice vulnerable application.

The first step is finding the scoreboard.

To find it, we observe several matches in the Javascript files using the browser inspector just searching for "score".Checking some of those matches we
rffuste.com/2024/01/08/owasp-j
#CTFs #juicyshop

Does anyone know of possible CTFs happening during Hacker Summer Camp, that are open to non-attendees online and free to participate in?

I haven't gotten my teeth into a live ctf in a while, and I miss it, the friendly competition is fun.

#defcon #hackersummercamp2023 #ctfs

2023-07-31

Burp Suite Academy: Exploiting XXE to perform SSRF attacksBurp Suite Academy
This lab has a "Check stock" feature that parses XML input and returns any unexpected values in the response.

The lab server is running a (simulated) EC2 metadata endpoint at the default URL, which is http://169.254.169.254/. This endpoint can be used to retrieve data about t
rffuste.com/2023/07/31/burp-su
#CTFs #burpSuiteAcademy

Eden ๐Ÿ’€ Chaos WranglerMrs_Skelli@defcon.social
2023-07-29

Hey folks!

I'm still looking for people looking to submit #CTFs for the @AppSecVillage #CTFSquared competition. Have a CTF lying around that you've never user before? Send it in! You may earn a cash prize of 2k!

sessionize.com/appsecvillage-c

MisterWh1t3misterwh1t3
2023-07-26

Anoche tuvimos un , donde retรฉ a @PinguinoDeMario a un desafรญo , como respuesta a su anterior reto, literalmente hubo de todo, estuvimos resolviendo , curiosidades y viendo como dichas .

๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡
youtu.be/-Mnm1tLP51Q?sub_confi

2023-07-24

Burp Suite Academy: Exploiting XXE using external entities to retrieve filesBurp Suite Academy
This lab has a "Check stock" feature that parses XML input and returns any unexpected values in the response.

To solve the lab, inject an XML external entity to retrieve the contents of the /etc/passwd file.

Checking the req
rffuste.com/2023/07/24/burp-su
#CTFs #burpSuiteAcademy

2023-07-10

Burp Suite Academy: SQL injection vulnerability allowing login bypassBurp Suite Academy
This lab contains a SQL injection vulnerability in the login function.To solve the lab, perform a SQL injection attack that logs in to the application as the administrator user.

Click on "My account":

We can see that the request is sent b
rffuste.com/2023/07/10/burp-su
#CTFs #burpSuiteAcademy

2023-07-09

A way of developing and maintaining attacker capabilities while you are part of the blue team would be participating in #wargames, #CTFs, and #bugbounties. These are places where you can attack third party systems legally and learn. Wargames: overthewire.org/wargames/, hackthebox.com/
CTFs: ctftime.org/calendar/
Bug bounties: bugcrowd.com and hackerone.com

2023-05-15

Burp Suite Academy โ€“ SQL injection vulnerability in WHERE clause allowing retrieval of hidden dataBurp Suite Academy
This lab contains a SQL injection vulnerability in the product category filter. When the user selects a category, the application carries out a SQL query like the following:

SELECT * FROM product
rffuste.com/2023/05/15/burp-su
#CTFs #burpSuiteAcademy

2023-05-08

Burp Suite Academy โ€“ DOM XSS in document.write sink using source location.search inside a select elementBurp Suite Academy
This lab contains a DOM-based cross-site scripting vulnerability in the stock checker functionality.

It uses the JavaScript document.write function, which writes data out to the page.
rffuste.com/2023/05/08/burp-su
#CTFs #burpSuiteAcademy

2023-04-26

Hello Fediverse! We protect companies against Hacker and Criminals. Our work is as dynamic and diverse as the threat itself. #moresecurity is our mission which underlines every step we take. The exchange of knowledge with the Community is important to us. Because #moresecurity can
reach its full potential with many comrades joining the mission.

Follow us for exciting IT security Content.

#EthicalHacking #Pentesting #SecurityAdvisories #ZeroDayExploits #HackingEvents #CTFs #Compliance #PentestingTools #OpenSourceTools #SecurityAudits #PaymentSecurity

Slayerranger/Crackamphetaminecrackamphetamine@cyberplace.social
2023-04-23

Time to dox some #infosec #frauds . This company is hosting #fake #CTFs to get free work by applicants! #LinkedIn #recruiter

2023-04-10

Burp Suite Lab Academy โ€“ Reflected XSS into a JavaScript string with angle brackets HTML encodedBurp Suite Lab Academy
This lab contains a reflected cross-site scripting vulnerability in the search query tracking functionality where angle brackets are encoded. The reflection occurs inside a JavaScript string. To
rffuste.com/2023/04/10/burp-su
#CTFs #burpSuiteAcademy

2023-04-06

Catch Bishop Fox in the wild: We are a sponsor of
@bsidessf this year! This will act as a start to our action-packed #RSAC week in San Francisco!

Also, check out @alethe's session on going from #socialengineering #CTFs to professional #RedTeaming.

bfx.social/3KpiCpA

2023-03-27

Burp Suite Lab Academy โ€“ Stored XSS into anchor `href` attribute with double quotes HTML-encoded
This lab contains a stored cross-site scripting vulnerability in the comment functionality. To solve this lab, submit a comment that calls the alert function when the comment author name is clicked.

Access to the lab:

According
rffuste.com/2023/03/27/burp-su
#CTFs #burpSuiteAcademy

2023-03-06

<strong>HTB Funnel</strong>
$ nmap -v -sV -p- 10.129.74.179 --min-rate 5000

Starting Nmap 7.93 ( nmap.org ) at 2023-03-04 10:15 CET
NSE: Loaded 45 scripts for scanning.
Initiating Ping Scan at 10:15
Scanning 10.129.74.179 [2 ports]
Completed Ping Scan at 10:15, 0.04s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 10:15
Completed Parallel DNS resolution of 1 host. at 10:15, 0.02s elapsed
Initiat
rffuste.com/2023/03/06/htb-fun
#CTFs #htb

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst