Visitor Count
Home
J053's Blog
Cancel

Exploiting exposed SVN folder for Account Takeover

Unveiling the Consequences of Subversion Disclosure : A Tale of Account TAkeover What is Subversion? Subversion, often referred to as SVN, is a centralized version control system that was initia...

Multilingual

SheHacks Intervarsity CTF Over the weekend, I had the opportunity of attending the Intervarsity CTF organized by Shehacks Kenya whith my school’s CTF team @Dumb1d0r3♾️🟰♾️ I and my team solved s...

Secured Notes

Secured Notes I created an application to retrieve my secrets. Is it realy secured? SecuredNotes.apk Solution Here, we were given an apkfile and we were tasked into finding whether the app was han...

Graph1

Web For the web challenges, I solved one challenge by the name Graph1. Graph1 We are given a link and told to find the flag. I was happy I had an opportunity to learn how graphql works. You can ...

Pico CTF (ReadMyCert)

ReadMyCert AUTHOR: SUNDAY JACOB NWANYIM Description How about we take you on an adventure on exploring certificate signing requests Take a look at this CSR file here Solution In this challenge,...

Pico CTF (HideToSee)

HideToSee AUTHOR: SUNDAY JACOB NWANYIM Description How about some hide and seek heh? Look at this image here. Solution This challenge was tricky as it required some forensics and then understan...

Pico CTF (Chrono)

Chrono AUTHOR: MUBARAK MIKAIL Description How to automate tasks to run at intervals on linux servers? Use ssh to connect to this server: Server: saturn.picoctf.net Port: 50213 Username: picoplaye...

Pico CTF (Permissions)

Permissions AUTHOR: GEOFFREY NJOGU Description Can you read files in the root file? Additional details will be available after launching your challenge instance. After starting the challenge we ...

Pico CTF (Money-ware)

Money-ware AUTHOR: JUNI19 Description Flag format: picoCTF{Malwarename} The first letter of the malware name should be capitalized and the rest lowercase. Your friend just got hacked and has been...

Pico CTF (Useless)

useless AUTHOR: LOIC SHEMA Description There’s an interesting script in the user’s home directory The work computer is running SSH. We’ve been given a script which performs some basic calculation...