
Creative
Creative User Flag nmap komutu: ┌──(root㉿kali)-[~] └─# nmap -T4 -sV 10.10.22.245 nmap sonucu: Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-04-29 11:10 EDT Nmap scan report for 10.10.2...
Creative User Flag nmap komutu: ┌──(root㉿kali)-[~] └─# nmap -T4 -sV 10.10.22.245 nmap sonucu: Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-04-29 11:10 EDT Nmap scan report for 10.10.2...
nmap: ┌──(root㉿kali)-[~] └─# nmap -T4 -sV -p 1883 -Pn -sS -sC 10.10.248.88 Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-05-06 00:02 UTC Nmap scan report for 10.10.248.88 (10.10.248.88) Hos...
What happens when a group of broke Computer Science students try to make a password manager? Obviously a perfect commercial success! Overpass User Flag nmap komutu: ┌──(root㉿kali)-[~] └─# n...
It seems like our machine got hacked by an anonymous threat actor. However, we are lucky to have a .pcap file from the attack. Can you determine what happened? Download the .pcap file and use Wires...
Chill Hack Öncelikle nmap taraması başlatalım. ┌──(root㉿r3tr0)-[~] └─# nmap -T5 -v -sV 10.10.28.212 nmap çıktısı: Starting Nmap 7.94SVN ( https://nmap.org ) at 2023-11-11 17:30 EST NSE: Lo...
You have found an IP address of an in-development Minecraft server. Can you root it? CyberCrafted Kaç tane port açık? nmap taraması başlatalım. nmap çıktısı: ┌──(root㉿r3tr0)-[~] └─# nmap -T...
This Rick and Morty-themed challenge requires you to exploit a web server and find three ingredients to help Rick make his potion and transform himself back into a human from a pickle. Pickle Ri...
You have found yourself in a strange corridor. Can you find your way back to where you came? In this challenge, you will explore potential IDOR vulnerabilities Corridor Görev 1 Koridordan Ka...
Compromise the machine and read the user.txt and root.txt Cyborg Görev 1 Compromise the System Her zamanki gibi nmap taramasıyla başlıyoruz. nmap -A -T5 -sV -p- $ip nmap çıktısı şu şekil...
In this CTF, we will explore the basics of OSINT (Open Source Intelligence), which plays a crucial role in penetration testing. From just a single photo provided, we are tasked with discovering th...