capture the flag, cybersecurity education, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 10 – You’re A Mean One, Mr. Yeti #TisTheSeasonForHacking

Another day, another challenge…

In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.

In our tenth challenge, Elf McSkidy was nowhere to be found. Elf Recon McRed noticed on one of their screens that Elf McSkidy was trapped in a game. Oh, no! An icy note reads, “Only by winning the unwinnable game shall your dear Elf McSkidy be reclaimed.”

The topics explored in this challenge are learning how data is stored in games and other applications. The effects of changing data in memory of a running game. Finally, use simple tools – in this case, Cetus, to find and alter data in memory.

Can Exploit Recon McRed beat the unwinnable game? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

capture the flag, cybersecurity education, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 15 – Santa Is Looking For A Sidekick #TisTheSeasonForHacking

Another day, another challenge…


In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.


In our fifteenth challenge, Santa hired a third-party developer to create a website to hire new elves. Elf McSkidy is aware that third-party risks are serious for websites, and have tasked Exploit McRed with testing the website before going live.


The topics explored in this challenge are input validation for file uploading, unrestricted file upload vulnerabilities, phishing through file uploads, and how to properly secure file upload functionality.


Can Exploit McRed determine if the website is safe before going live? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

capture the flag, cybersecurity education, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 14 – I’m Dreaming Of Secure Web Apps #TisTheSeasonForHacking

Another day, another challenge…


In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.


In our fourteenth challenge, Elf McSkidy has to review the web application security. She consults Elf Exploit McRed who discovers there’s a web vulnerability – IDOR. Can Elf McSkidy find the IDOR on the server?


The topics explored in this challenge are web applications and databases. Along with learning about OWASP (Open Web Application Security Project), access control, and IDORs (Insecure Direct Object Reference)


Can Elf McSkidy find the IDOR on the server? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

capture the flag, cybersecurity education, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 13 – Simply Having A Wonderful PCAP Time #TisTheSeasonForHacking

Another day, another challenge…


In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.


In our thirteenth challenge, the SOC team notice suspicious network activity after investigating the malware in Day 12 challenge. Santa’s SOC team needs to analyze the network traffic to see any malicious activity happening on the network.


The topics explored in this challenge are packet and packet analysis. The tool used is Wireshark which is an industry-standard tool for network protocol analysis and is used for traffic and packet investigations.


Can Santa’s SOC determine if there’s malicious activity on the network? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

capture the flag, cybersecurity education, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 12 – Forensic McBlue To The REVscue! #TisTheSeasonForHacking

Another day, another challenge…


In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.


In our twelfth challenge, Forensics McBlue confirmed the malicious document spawned a suspicious binary. Forensics McBlue’s job is to further analyze the binary via Malware Analysis.


The topics explored in this challenge are malware analysis – why it’s important and how it should be done in a safe environment (such as a sandbox). Items to determine if malware is present such as new network connections, registry key modifications, and file manipulations. Finally, there were two tools that were discussed – Detect It Easy (DIE) and CAPA.


Can Forensic McBlue determine if suspicious file is malware? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

capture the flag, cybersecurity education, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 11 – Not All Gifts Are Nice #TisTheSeasonForHacking

Another day, another challenge…


In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.


In our eleventh challenge, Elf McDave clicked on a document and now there’s a command prompt running code on their computer. As Elf McBlue we create a memory dump and analyze the dump to determine the root cause.


The topics explored in this challenge are memory forensics and why it’s important. We’re also introduced to the volatility tool that can be used to determine processes and programs that were executed before a computer crash.


Can Elf McBlue dump the image to determine the root cause? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

capture the flag, cybersecurity education, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 7 – Maldocs Roasting On An Open Fire #TisTheSeasonForHacking

Another day, another challenge…


In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.


In our seventh challenge, Elf McSkidy accidentally opened an attachment and believed processes/commands were being executed in the background. McSkidy employs Forensic McBlue to determine if his suspicion is confirmed.


The topics explored in this challenge are reviewing a (potential) malware document through CyberChef.


Is McSkidy’s suspicions about the document correct? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

capture the flag, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 8 – Last Christmas I Gave You My ETH #TisTheSeasonForHacking

Another day, another challenge…


In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.


In our eighth challenge, The Best Festival Company (TBFC) was using blockchain and attempting to mint cryptocurrency. It was determined TBFC was compromised, and all the currency was lost during the attack.


The topics explored in this challenge are smart contracts – the functionality, and a common security vulnerability called the re-entrancy attack.


Can we determine how to find and replay the attack? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

capture the flag, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 6 – It’s Beginning To Look A Lot Like Phishing #TisTheSeasonForHacking

Another day, another challenge…

In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.

In our sixth challenge, Elf McBlue is researching email activity on the network to see if there was a phishing attack.

The topics explored in this challenge are social engineering, how to complete email analysis, important email headers, and how to use Sublime text to view emails with the .msg and .eml extensions, along with tools such as emlAnalyzer, email reputation, VirusTotal, and InQuest.

Can Elf McBlue determine if there was a phishing attack on the network? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

capture the flag, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 5 – He Knows When You’re Awake #TisTheSeasonForHacking

Another day, another challenge…

In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.

In our fifth challenge, elf Recon McRed is searching the network to see if there are any backdoors that Bandit Yeti APT group have left behind.

The topics explored in this challenge are remote access services such as SSH, RDP, and VNC. Authentication, techniques to attack passwords, and finally how to hack an authentication service. Tools explored in this challenge were nmap (network mapper) and hydra.

Can Recon McRed figure out if Bandit Yeti APT Group left any backdoors in the web server? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007