Writeup: The SANS HOLIDAY HACK CHALLENGE 2021 – Kringlecon 4 CALLING BIRDS!

It’s that time of the year again, to reveal my writeup for the Sans Holiday Hack Challenge. This time around Sans named the game “Kringlecon 4 – Calling Birds!”. My last year submission resulted in an “Honorable Mention”. Since I have had major issues with documenting massive writeups using WordPress , I have decided toContinue reading “Writeup: The SANS HOLIDAY HACK CHALLENGE 2021 – Kringlecon 4 CALLING BIRDS!”

Writeup: The SANS HOLIDAY HACK CHALLENGE 2020 – Kringlecon 3 French Hens!

It’s that time of the year again, to reveal my writeup for the Sans Holiday Hack Challenge. This time around Sans named the game “Kringlecon 3 – French Hens”. My last year submission resulted in an “Super Honorable Mention”. This year I got an “Honorable Mention” under my own name. Since I have had majorContinue reading “Writeup: The SANS HOLIDAY HACK CHALLENGE 2020 – Kringlecon 3 French Hens!”

Writeup: The SANS HOLIDAY HACK CHALLENGE 2019 – Kringlecon 2 Turtle Doves!

It’s that time of the year again, to reveal my writeup for the Sans Holiday Hack Challenge. This time around Sans named the game “Kringlecon 2 – Turtle Doves” and featured lots and lots of blue team related objectives. During the game I became good friends with Splunk, Graylog and various other neat tools. SinceContinue reading “Writeup: The SANS HOLIDAY HACK CHALLENGE 2019 – Kringlecon 2 Turtle Doves!”

Taking the Certified Ethical Hacker (CEH) certification

Taking the Certified Ethical Hacker (CEH) certification from ECCouncil has been on my bucket list for some years now. I planned on taking it five years ago, but never found the time to do it – until this year. In this blogpost I will share how I approached taking this certification! Attending the offical classContinue reading “Taking the Certified Ethical Hacker (CEH) certification”

Writeup: The SANS HOLIDAY HACK CHALLENGE 2018 – Kringlecon

The most beautiful event of 2018 has ended. Kringlecon is over! I’m a bit sad about it because the game was just so good this year! There were plenty of interesting tasks and objectives. Everything from simple assignments such as breaking out of VI to tearing apart and analysing a malware! Heck, you even hadContinue reading “Writeup: The SANS HOLIDAY HACK CHALLENGE 2018 – Kringlecon”

Got slow portscans on CTF’s?

Aaaaaargh, my port scan take forever to complete! Heard that one before? You should have, it is a common complaint often heard between CTF rookies. Today we are looking into some ways to mitigate slow scans. Nmap When looking at the various complaints, Nmap seem to be the culprit. Gamers bash it for being slowContinue reading “Got slow portscans on CTF’s?”

Trollcave 1.2 – walkthrough

Trollcave is a vulnerable VM, in the tradition of Vulnhub and infosec wargames in general. You start with a virtual machine which you know nothing about – no usernames, no passwords, just what you can see on the network. In this instance, you’ll see a simple community blogging website with a bunch of users. FromContinue reading “Trollcave 1.2 – walkthrough”

Notes on making CTF games

Some time ago I wrote a post named “unofficial guide to creating CTF VMs“. Since then I have been approached by random people, students I mentor and colleagues asking how to make that virtual machine vulnerable. Well, I never intended that post to reveal that. It was simply left as an exercise to the readers. Today IContinue reading “Notes on making CTF games”

Zico2:1 – walkthrough

Description from Vulnhub: Zico is trying to build his website but is having some trouble in choosing what CMS to use. After some tries on a few popular ones, he decided to build his own. Was that a good idea? Host discovery As always, I went hunting for the target: IPv Address IPv4 192.168.110.28 IPv6Continue reading “Zico2:1 – walkthrough”

Bulldog 1 – walkthrough

Description from Vulnhub: “Bulldog Industries recently had its website defaced and owned by the malicious German Shepherd Hack Team. Could this mean there are more vulnerabilities to exploit? Why don’t you find out? 🙂 This is a standard Boot-to-Root. Your only goal is to get into the root directory and see the congratulatory message, howContinue reading “Bulldog 1 – walkthrough”