All Posts

Complete collection of blog posts, writeups, and technical articles

Buckeye Ctf Writeup

November 11, 2025
CTF Web Pwn +2
So whilst travelling back home, I had time on my hands since I arrived at the airport 5 HOURS early because I thought the traffic would be bad *turns out...

V1t Ctf 2025

November 09, 2025
Welcome to a comprehensive guide through five interesting cryptographic and steganographic challenges! Each one teaches a different technique for hiding or protecting information. Whether you’re new to CTFs or looking...

Nasm Crack

December 27, 2024 Reverse Engineering
This is a solution submitted to the crackmes.one challenge by BitFriends Challenge Description Author: BitFriends Language: Assembler Upload: 7:05 PM 04/25/2020 Platform: Unix/linux Difficulty: 1.0 Quality: 4.0 Architecture: x86-64 Challenge...

Brutus Hackthebox Writeup

August 25, 2024 DFIR
Scenario In this very easy Sherlock, you will familiarize yourself with Unix auth.log and wtmp logs. We’ll explore a scenario where a Confluence server was brute-forced via its SSH service....

Noxious Htb

August 10, 2024 CTF Writeup Pentesting
Sherlock Scenario The IDS device alerted us to a possible rogue device in the internal Active Directory network. The Intrusion Detection System also indicated signs of LLMNR traffic, which is...