HackTheBox’s Illumination Forensics Writeup Description: A Junior Developer just switched to a new source control platform. Can you find the secret token? Task Files:
Read MoreBasic File Exploit — Binary Exploitation Challenge by PicoCTF 2022 | Approach by Karthikeyan NagarajDescription:The program provided allows you to write to a file and read
Read MoreAnalysis Open the shark2.pcapng task file in Wireshark Let’s look for any Suspicious Packet 2. Search for Strings such as flag, txt, pico, as it is the CTF or
Read More