CTF Write-ups

Detailed Capture the Flag (CTF) write-ups covering real-world scenarios, web exploitation, reverse engineering, Crypto, Boot2Root, and more. Learn practical hacking techniques step-by-step and improve your skills with walkthroughs of popular CTF challenges.

Host & Network Penetration Testing: System-Host Based Attacks CTF 2 — Walkthrough

Host & Network Penetration Testing: System-Host Based Attacks CTF 2 — Walkthrough Last updated: July 12, 2025 Hi everyone! In this article, we will solve the Host & Network Penetration Testing System-Host Based Attacks CTF 2 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather […]

Host & Network Penetration Testing: System-Host Based Attacks CTF 2 — Walkthrough Read More »

Host & Network Penetration Testing: System-Host Based Attacks CTF 1 — Walkthrough

Host & Network Penetration Testing: System-Host Based Attacks CTF 1 — Walkthrough Last updated: July 09, 2025 Hi everyone! In this article, we will solve the Host & Network Penetration Testing: System-Host Based Attacks CTF 1 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather

Host & Network Penetration Testing: System-Host Based Attacks CTF 1 — Walkthrough Read More »

Assessment Methodologies: Vulnerability Assessment CTF 1 — Walkthrough

Assessment Methodologies: Vulnerability Assessment CTF 1 — Walkthrough Last updated: July 12, 2025 Hi everyone! In this article, we will solve the Assessment Methodologies: Vulnerability Assessment CTF 1 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather solve it yourself and follow my instructions, so

Assessment Methodologies: Vulnerability Assessment CTF 1 — Walkthrough Read More »

Assessment Methodologies: Enumeration CTF 1 — Walkthrough

Assessment Methodologies: Enumeration CTF 1 — Walkthrough Last updated: July 12, 2025 Hi everyone! In this article, we will solve the Assessment Methodologies: Enumeration CTF 1 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather solve it yourself and follow my instructions, so sit back

Assessment Methodologies: Enumeration CTF 1 — Walkthrough Read More »

Assessment Methodologies: Footprinting and Scanning CTF 1 — Walkthrough

Assessment Methodologies: Footprinting and Scanning CTF 1 — Walkthrough Last updated: July 11, 2025 Hi everyone! In this article, we will solve the Assessment Methodologies: Footprinting and Scanning CTF 1 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather solve it yourself and follow my

Assessment Methodologies: Footprinting and Scanning CTF 1 — Walkthrough Read More »

Assessment Methodologies: Information Gathering CTF 1 — eJPTv2 Walkthrough

Assessment Methodologies: Information Gathering CTF 1 — eJPTv2 Walkthrough Last updated: July 09, 2025 Hi everyone! In this article, we will solve the Assessment Methodologies: Information Gathering CTF 1 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather solve it yourself and follow my instructions,

Assessment Methodologies: Information Gathering CTF 1 — eJPTv2 Walkthrough Read More »

SSTI2 PicoCTF: Web Exploitation | walkthrough

SSTI2 PicoCTF: Web Exploitation | walkthrough Last updated: July 09, 2025 Hi everyone! In this walkthrough, we will explore the SSTI2 Web Exploitation (Medium Level) Challenge. Let’s go! So just launch the Instance. After launching it, you will see a web page like: As from the Challenge name, its actually a server-side template injection (SSTI),

SSTI2 PicoCTF: Web Exploitation | walkthrough Read More »