RE: VMWare Workstation VLANs
Last year I wrote about using VLANs with VMWare Workstation with systemd-networkd. A year later, I’m still actively using this process in my day to day workf...
Last year I wrote about using VLANs with VMWare Workstation with systemd-networkd. A year later, I’m still actively using this process in my day to day workf...
A write-up of the Disorderly2 crypto challenge from 5Charlie CTF.
UPDATE: I have written an easier, more robust guide that leverages NetworkManager and nmcli.
A write-up of the “Escalator” privelege escalation challenge set from 5Charlie CTF.
A write-up of the “Easy Too” reverse engineering challenge from 5Charlie CTF.
A write-up of the “Easy Channel” network covert-channel pcap analysis challenge from 5Charlie CTF.
A write-up of the “Busy Day” network covert-channel pcap analysis challenge from 5Charlie CTF.
A write-up of the Plyushkin SQLi challenge from 5Charlie CTF.
A write-up of the “Myste-RE” reverse-engineering challenge from 5Charlie CTF.
UPDATE: Updates to the Unifi software now conflict with this configuration. I highly recommend finding an alternative solution as this will cause the Unifi P...
Configure your host firewall to allow DHCPv6 inbound.
A write-up of the “Odyssey” container memory export forensic analysis challenge from 5Charlie CTF.
A write-up of the “Pop” audio steganography challenge from 5Charlie CTF.
A write-up of the “Korobochka” Elastic hacking challenge from 5Charlie CTF.
A write-up of the “MD5” network covert-channel pcap analysis challenge from 5Charlie CTF.
A write-up of the “Wisdom” network covert-channel pcap analysis challenge from 5Charlie CTF.
A write-up of the Aperture Linux live system forensics challenge from 5Charlie CTF.
A write-up of the “Cracking” password cracking challenge from 5Charlie CTF.
A write-up of the “Normal” network covert-channel pcap analysis challenge from 5Charlie CTF.
A write-up of the BMP image steganography challenge from 5Charlie CTF.
A write-up of the Blackjack 2.0 Python application security challenge from 5Charlie CTF.
A write-up of the Blackjack Python application security challenge from 5Charlie CTF.
A write-up of the Aperture Linux live system forensics challenge from 5Charlie CTF.
A write-up of the 0day Windows memory forensics challenge from 5Charlie CTF.
During a King-of-the-Hill or Attack/Defend-style Capture the Flag exercise, defenders are under pressure to defend many hosts at once, to the best of their a...