Muhammad Husnain

Hi, I am Muhammad Husnain, A Cybersecurity student passionate about Ethical Hacking!

CryptoSystem — TryHackMe Walkthrough

CryptoSystem — TryHackMe Walkthrough Last updated: July 17, 2025 In this crypto challenge, we have been given an RSA-encrypted message, and we have to find the key We were presented with a Python script that implemented a custom RSA encryption scheme. The script generated two large prime numbers: p, using the getPrime() function to create a 1024-bit prime,

CryptoSystem — TryHackMe Walkthrough Read More »

Web Application Penetration Testing CTF 1 — Walkthrough

Web Application Penetration Testing CTF 1 — Walkthrough Last updated: July 17, 2025 Hi everyone! In this article, we will solve the Web Application Penetration Testing CTF 1 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather solve it yourself and follow my instructions, so

Web Application Penetration Testing CTF 1 — Walkthrough Read More »

Host & Network Penetration Testing Post-Exploitation CTF 2 — Walkthrough

Host & Network Penetration Testing Post-Exploitation CTF 2 — Walkthrough Last updated: July 17, 2025 Hi everyone! In this article, we will solve the Host & Network Penetration Testing Post-Exploitation CTF 2 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather solve it yourself and

Host & Network Penetration Testing Post-Exploitation CTF 2 — Walkthrough Read More »

Host & Network Penetration Testing Post-Exploitation CTF 1 — Walkthrough

Host & Network Penetration Testing Post-Exploitation CTF 1 — Walkthrough Last updated: July 17, 2025 Hi everyone! In this article, we will solve the Host & Network Penetration Testing Post-Exploitation CTF 1 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather solve it yourself and

Host & Network Penetration Testing Post-Exploitation CTF 1 — Walkthrough Read More »

Host & Network Penetration Testing: Exploitation CTF 3 — Walkthrough

Host & Network Penetration Testing: Exploitation CTF 3 — Walkthrough Last updated: July 17, 2025 Hi everyone! In this article, we will solve Host & Network Penetration Testing Exploitation CTF 3 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather solve it yourself and follow

Host & Network Penetration Testing: Exploitation CTF 3 — Walkthrough Read More »

Host & Network Penetration Testing Exploitation CTF 2 — Walkthrough

Host & Network Penetration Testing Exploitation CTF 2 — Walkthrough Last updated: July 17, 2025 Hi everyone! In this article, we will solve the Host & Network Penetration Testing: Exploitation CTF 2 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather solve it yourself and

Host & Network Penetration Testing Exploitation CTF 2 — Walkthrough Read More »

Host & Network Penetration Testing The Metasploit Framework CTF 2— Walkthrough

Host & Network Penetration Testing The Metasploit Framework CTF 2— Walkthrough Last updated: July 17, 2025 Hi everyone! In this article, we will solve the Host & Network Penetration Testing The Metasploit Framework CTF 2 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather solve

Host & Network Penetration Testing The Metasploit Framework CTF 2— Walkthrough Read More »