CTF Write-ups

Detailed Capture the Flag (CTF) write-ups covering real-world scenarios, web exploitation, reverse engineering, Crypto, Boot2Root, and more. Learn practical hacking techniques step-by-step and improve your skills with walkthroughs of popular CTF challenges.

CryptoSystem — TryHackMe Walkthrough

CryptoSystem — TryHackMe Walkthrough Last updated: July 17, 2025 In this crypto challenge, we have been given an RSA-encrypted message, and we have to find the key We were presented with a Python script that implemented a custom RSA encryption scheme. The script generated two large prime numbers: p, using the getPrime() function to create a 1024-bit prime,

CryptoSystem — TryHackMe Walkthrough Read More »

Web Application Penetration Testing CTF 1 — Walkthrough

Web Application Penetration Testing CTF 1 — Walkthrough Last updated: July 17, 2025 Hi everyone! In this article, we will solve the Web Application Penetration Testing CTF 1 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather solve it yourself and follow my instructions, so

Web Application Penetration Testing CTF 1 — Walkthrough Read More »

Host & Network Penetration Testing Post-Exploitation CTF 2 — Walkthrough

Host & Network Penetration Testing Post-Exploitation CTF 2 — Walkthrough Last updated: July 17, 2025 Hi everyone! In this article, we will solve the Host & Network Penetration Testing Post-Exploitation CTF 2 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather solve it yourself and

Host & Network Penetration Testing Post-Exploitation CTF 2 — Walkthrough Read More »

Host & Network Penetration Testing Post-Exploitation CTF 1 — Walkthrough

Host & Network Penetration Testing Post-Exploitation CTF 1 — Walkthrough Last updated: July 17, 2025 Hi everyone! In this article, we will solve the Host & Network Penetration Testing Post-Exploitation CTF 1 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather solve it yourself and

Host & Network Penetration Testing Post-Exploitation CTF 1 — Walkthrough Read More »

Host & Network Penetration Testing: Exploitation CTF 3 — Walkthrough

Host & Network Penetration Testing: Exploitation CTF 3 — Walkthrough Last updated: July 17, 2025 Hi everyone! In this article, we will solve Host & Network Penetration Testing Exploitation CTF 3 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather solve it yourself and follow

Host & Network Penetration Testing: Exploitation CTF 3 — Walkthrough Read More »

Host & Network Penetration Testing Exploitation CTF 2 — Walkthrough

Host & Network Penetration Testing Exploitation CTF 2 — Walkthrough Last updated: July 17, 2025 Hi everyone! In this article, we will solve the Host & Network Penetration Testing: Exploitation CTF 2 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather solve it yourself and

Host & Network Penetration Testing Exploitation CTF 2 — Walkthrough Read More »

Host & Network Penetration Testing The Metasploit Framework CTF 2— Walkthrough

Host & Network Penetration Testing The Metasploit Framework CTF 2— Walkthrough Last updated: July 17, 2025 Hi everyone! In this article, we will solve the Host & Network Penetration Testing The Metasploit Framework CTF 2 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather solve

Host & Network Penetration Testing The Metasploit Framework CTF 2— Walkthrough Read More »

Host & Network Penetration Testing The Metasploit Framework CTF 1 — Walkthrough

Host & Network Penetration Testing The Metasploit Framework CTF 1 — Walkthrough Last updated: July 07, 2025 Hi everyone! In this article, we will solve the Host & Network Penetration Testing The Metasploit Framework CTF 1 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather

Host & Network Penetration Testing The Metasploit Framework CTF 1 — Walkthrough Read More »

Host & Network Penetration Testing Network-Based Attacks CTF 1 — Walkthrough

Host & Network Penetration Testing Network-Based Attacks CTF 1 — Walkthrough Last updated: July 07, 2025 Hi everyone! In this article, I will solve the Host & Network Penetration Testing: Network-Based Attacks CTF 1 (eJPTv2). So sit back and read! Flag 1: What is the URL accessed by the infected user that returned a 200

Host & Network Penetration Testing Network-Based Attacks CTF 1 — Walkthrough Read More »