capture the flag, cybersecurity education, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 23 – Mission ELFPossible: Abominable For A Day #TisTheSeasonForHacking

Another day, another challenge…

In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.

In our twenty-third challenge, we’re tasked as Bad Yeti to get Santa’s Vault password and flags. The challenge grows in difficulty as more defense layers are added.

The topics explored in this challenge are in-depth defense tactics such as disrupting adversarial objectives by reviewing the three levels of defense. The first level focuses on perimeter security. The second level focuses on defense in layers with an emphasis on prevention. The third and final level builds upon level two but adds alerting and response capabilities.

Can we beat the game with the different defense layers in place? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

capture the flag, cybersecurity education, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 22 – Threats Are Failing All Around Me #TisTheSeasonForHacking

Another day, another challenge…

In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.

In our twenty-second challenge, the elves want to improve Santa’s security posture after the recent attempts to disrupt Christmas.

The topics explored in this challenge are understanding an attack vector and the concept of an attack surface.

Can we help the elves update Santa’s servers before Christmas? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

capture the flag, cybersecurity education, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 9 – Dock The Halls #TisTheSeasonForHacking

Another day, another challenge…

In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.

In our ninth challenge, we discover there’s a recent incident. Because of this, Santa wanted to set up a web application running on Docker as it’s supposed to be more secure. Our job is to show there are still weaknesses while using Docker.

The topics explored in this challenge are Metasploit, which can be used to compromise systems. We also learned network pivoting and post-exploitation.

Can we help Santa find the weaknesses on the web server before the bad guys? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

capture the flag, cybersecurity education, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 19 – Wiggles Go Brr #TisTheSeasonForHacking

Another day, another challenge…

In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.

We had a hardware implant in Santa’s workshop in our nineteenth challenge. We have to analyze the implant to understand how it works.

The topics explored in this challenge are hardware communication protocols such as USART, SPI, and I2C. Along with how to analyze these protocols.

Can we help Santa determine how the hardware implant works? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

capture the flag, cybersecurity education, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 20 – Binwalkin’ Around The Christmas Tree #TisTheSeasonForHacking

Another day, another challenge…

In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.

In our twentieth challenge, we’re learning more about the device found in Santa’s workshop. In this challenge, we learned the Device ID, and now we have to reverse engineer the device to determine the firmware and endpoints.

The topics explored in this challenge are firmware reverse engineering, extracting code from firmware, and modifying and rebuilding firmware.

Can we reverse-engineer the device to help Santa? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

capture the flag, cybersecurity education, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 16 – SQLi’s The King, The Carolers Sing #TisTheSeasonForHacking

Another day, another challenge…

In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.

In our sixteenth challenge, Elf McSkidy asked Elf Exploit and Elf Admin to assist in clearing the application. When presented with the app’s code, both elves looked a bit shocked, as none of them knew how to make any sense of it, let alone fix it.

The topics explored in this challenge are Structured Query Language (SQL) and the vulnerability – SQL injection. SQL Injection happens when a website creates a dynamic query using user input (without being sanitized/validated). The final topic was ways to mitigate this vulnerability, such as parameterized queries.

Can we help Elf Exploit and Elf Admin secure the website? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

capture the flag, cybersecurity education, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 18 – Lumberjack Lenny Learns New Rules #TisTheSeasonForHacking

Another day, another challenge…

In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.

In our eighteenth challenge, we discovered The Best Festival Company Infrastructure has been compromised! Through logs, we determined that Bandit Yeti was the likely culprit. Our job is to experiment and learn threat detection rules to determine the root cause of how Bandit Yeti compromised the system.

The topics explored in this challenge are threat detection, which analyzes abnormal activity, such as malicious signs of compromise on a network. A tool that can be used for threat detection is Sigma. Sigma allows us to create rules to look for malicious activity, such as new user accounts or editing scheduled tasks.

Can we use threat detection tools to find the root cause of Santa’s compromise? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

capture the flag, cybersecurity education, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 17 – Filtering For Order Amidst Chaos #TisTheSeasonForHacking

Another day, another challenge…

In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.

In our seventeenth challenge, Elf McSkidy stumbled upon user-submitted inputs on an unrecognizable web application. She then discovered that Santa’s team hadn’t updated these web applications in a long time.

The topics explored in this challenge are input validation and why it’s essential. We developers should never trust user input, as this input can be malicious. The next topic was regular expressions, a technique used to create an allowed list of permitted characters and numbers for your application.

Can we teach Elf McSkidy regex to update the website? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

capture the flag, cybersecurity education, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 10 – You’re A Mean One, Mr. Yeti #TisTheSeasonForHacking

Another day, another challenge…

In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.

In our tenth challenge, Elf McSkidy was nowhere to be found. Elf Recon McRed noticed on one of their screens that Elf McSkidy was trapped in a game. Oh, no! An icy note reads, “Only by winning the unwinnable game shall your dear Elf McSkidy be reclaimed.”

The topics explored in this challenge are learning how data is stored in games and other applications. The effects of changing data in memory of a running game. Finally, use simple tools – in this case, Cetus, to find and alter data in memory.

Can Exploit Recon McRed beat the unwinnable game? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

capture the flag, cybersecurity education, hacking

@RealTryHackMe #AdventOfCyber Series: Challenge 15 – Santa Is Looking For A Sidekick #TisTheSeasonForHacking

Another day, another challenge…


In this post, we’re starting a new series, the Advent of Cyber, hosted by TryHackMe. This is the fourth year of the Advent of Cyber, where a challenge is released every day leading to Christmas. There will be 25 challenges; we’re McSkidy, an elf trying to save Christmas.


In our fifteenth challenge, Santa hired a third-party developer to create a website to hire new elves. Elf McSkidy is aware that third-party risks are serious for websites, and have tasked Exploit McRed with testing the website before going live.


The topics explored in this challenge are input validation for file uploading, unrestricted file upload vulnerabilities, phishing through file uploads, and how to properly secure file upload functionality.


Can Exploit McRed determine if the website is safe before going live? Find out below!

If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007