Trollcave 1.2 – walkthrough

Trollcave is a vulnerable VM, in the tradition of Vulnhub and infosec wargames in general. You start with a virtual machine which you know nothing about – no usernames, no passwords, just what you can see on the network. In this instance, you’ll see a simple community blogging website with a bunch of users. From […]

Read More Trollcave 1.2 – walkthrough

Proteus V1 – Walkthrough

Welcome to another segment in my Vulnhub series! Haven’t had much time to focus on these lately due to work – but I managed to squeeze in some time over the last few weeks to play with the Proteus game. So here it is! Description from Vulnhub: “An IT Company implemented a new malware analysis […]

Read More Proteus V1 – Walkthrough

DonkeyDocker 1 – Walkthrough

This writeup covers the Vulnhub CTF game DonkeyDocker 1 (2017), which might be the most interesting game I have played this year. In this game players are to play with Docker – a task that lies close to my heart since I love this technology. Although I am bit rusty on it ever since I […]

Read More DonkeyDocker 1 – Walkthrough

Ew_Skuzzy 1 – walkthrough

Today I am sharing my work log for the “Ew_Skuzzy: 1” CTF game. This game was released only recently, on the 17th of March 2017. As of time of writing, there haven’t been much information released about it. That adds another dimension to solving it and suits me fine. As always I have based my […]

Read More Ew_Skuzzy 1 – walkthrough

HackDay Albania – Walkthrough

This segment of my Vulnhub series covers a walkthrough for the HackDay Albania CTF game. From the description: “This was used in HackDay Albania’s 2016 CTF. The level is beginner to intermediate. It uses DHCP”. Interesting description that doesn’t hint at anything. This’ll purely be a black box test. Let’s dive in! Test lab environment […]

Read More HackDay Albania – Walkthrough

IMF – Walkthrough

This segment of my Vulnhub series covers the walkthrough for the IMF Boot2Root virtual machine. From the description: IMF is a intelligence agency that you must hack to get all flags and ultimately root. The flags start off easy and get harder as you progress. Each flag contains a hint to the next flag. Difficulty: […]

Read More IMF – Walkthrough

Breach: 2.1 – walkthrough

Breach 2.1 is a boot2root/CTF challenge that attempts to showcase a real-world scenario. The challenge is provided as a VM configured with a static IP ( The following blog post is my log from playing this challenge. Test lab environment As usual my test lab consists of: Virtual Box Parrot OS Breach 2.1 VM Initial […]

Read More Breach: 2.1 – walkthrough

PwnLab: Init – walkthrough

Welcome to another Vulnhub walkthrough – this time I’ll cover the PwnLab: Init CTF game! Let’s get hacking Testlab environment As ususal, this is my lab setup for this game: Virtual Box Parrot OS Pwnlab: Init Vulnhub image Test lab network CIDR Discovering Vulnhub image The very first thing we must do is to find […]

Read More PwnLab: Init – walkthrough

Fuzzing – CTF primer

Fuzz testing or fuzzing is a technique commonly used in software testing to find how software responds to invalid, unexpected or random data. The targeted software may fail, give unexpected output or misbehave processing the randomized input data. Input that leads to such situations is then addressed and rectified. The term fuzz testing originates from a […]

Read More Fuzzing – CTF primer