Hello, In this article you will find the solutions for the Hydra room on Try Hack Me. Link: https://tryhackme.com/room/hydra Almost every bruteforcing or cracking task from HackTheBox/TryHackMe uses the rockyou.txt wordlist. You can google it and download it, if you can't find it in your Kali distro under the path /usr/share/wordlists/rockyou.txt.gz If you're using Kali … Continue reading Brute-forcing passwords with Hydra
CTF
CTF Write-Ups
picoCTF2019 Reverse Engineering Asm
Hello, here's my take on the picoCTF2019 reverse engineering asm challenges. If you don't know assembly, please watch a few tutorials on it: http://opensecuritytraining.info/IntroX86.htmlhttp://opensecuritytraining.info/IntermediateX86.html asm1 - Points: 200 CMP: Compares the first source operand with the second source operand and sets the status flags in the EFLAGS register according to the results. The comparison is … Continue reading picoCTF2019 Reverse Engineering Asm
picoCTF 2019 Reverse Engineering Vault Doors
I'm always late to the party but here's my solutions to the PicoCTF2019 Vault Doors challenges from the reverse engineering section. I did it this mainly to improve my skills and hopefully to learn some new things. vault-door-training - Points: 50 Your mission is to enter Dr. Evil's laboratory and retrieve the blueprints for his … Continue reading picoCTF 2019 Reverse Engineering Vault Doors
PicoCTF 2019: whats-the-difference (Points 200)
Can you spot the difference? kitters cattos. They are also available at /problems/whats-the-difference... on the shell server In order to easily solve this challenge, I've used xxd and cut to generate an ascii hexdump of the images: ➜ Downloads xxd kitters.jpg | cut -d ' ' -f 11 > kittens_text.txt ➜ Downloads xxd cattos.jpg | … Continue reading PicoCTF 2019: whats-the-difference (Points 200)