TryHackMe: Opacity write-up
In this article, we’re gonna dive into the solution for the “Opacity” challenge. Our goal is to bypass a file-upload filter and exploit Linux permissions to get root access. Link… Read more
In this article, we’re gonna dive into the solution for the “Opacity” challenge. Our goal is to bypass a file-upload filter and exploit Linux permissions to get root access. Link… Read more
In this article, we will explore the solution to the “Eavesdropper” challenge, which involves monitoring Linux processes with limited privileges and exploiting the $PATH variable to gain root access on… Read more
This challenge shows how important it is to understand data representation and conversion techniques in cybersecurity. We need to find a hidden flag by converting ASCII codes into human-readable text…. Read more
In this article we are going to explore the solution to TryHackMe’s MD2PDF and exploit a Markdown converter. Link: https://tryhackme.com/room/md2pdf Difficulty: Easy Enumeration To begin the enumeration process, I launched… Read more
In this challenge, we will utilize a utility to extract metadata from an image file and use Base64 decoding to reveal the hidden flag. Digital images often contain more information… Read more
In this challenge, we aim to “crack” a simple letter substitution cipher. Cryptography can be straightforward if you understand the basics, such as ROT13. Here’s the encoded text we need… Read more
Recent comments