swampCTF 2025 - Editor - Web challange

Introduction I solved the Editor challenge in the Web category. More info about this CTF is here Editor I went to the page that was in the challange description, and I was prompted with the message “Forbidden” I set up the server locally by downloading the attachment, then going into the backend and typing python server.py I went to the site I put up locally (and again forbidden) ...

March 30, 2025 · 2 min · 220 words · manfcg

swampCTF 2025 - OSINT challenges

Introduction I have solved all 3 of the 3 OSINT tasks. More info about this CTF is here Party Time! It was a simple challenge - and I’ve got first blood on it! The goal was to find a location from a photo. To solve this challange I simply extracted the metadata, and made it flag with it (the syntax was given to us in the challange description). ...

March 30, 2025 · 2 min · 402 words · manfcg

THM Writeup - Thompson

Room link: https://tryhackme.com/r/room/bsidesgtthompson I started with enumeration nmap -oN nmap.txt -Pn -T4 -sC -sV 10.10.188.85 PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 (Ubuntu Linux; protocol 2.0) 8009/tcp open ajp13 Apache Jserv (Protocol v1.3) 8080/tcp open http Apache Tomcat 8.5.5 I went to the site http://10.10.188.85:8080 I clicked Manager App and it asked me for a login I tried admin:tomcat and tomcat:tomcat but it didn’t let me in, so I pressed cancel button and it displayed some interesting information ...

January 3, 2025 · 2 min · 368 words · manfcg

THM Writeup - Cyborg

Room link: https://tryhackme.com/r/room/cyborgt8 We have these questions to answer: Scan the machine, how many ports are open? What service is running on port 22? What service is running on port 80? What is the user.txt flag? What is the root.txt flag? On port 22 is ssh by default, and on port 80 is http, but first let’s check it with a nmap scan - btw, we will then be able to answer question number 1 ...

January 3, 2025 · 4 min · 706 words · manfcg

THM Writeup - Lazy Admin

Room link: https://tryhackme.com/r/room/lazyadmin I’ll start everything by nmap scan, and on background I’ll run gobuster nmap -oN nmap.txt -Pn -T4 -sC -sV -p- 10.10.19.199 PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.8 (Ubuntu Linux; protocol 2.0) 80/tcp open http Apache httpd 2.4.18 ((Ubuntu)) gobuster dir -o gobuster.txt -u 10.10.19.199 -w /usr/share/wordlists/seclists/Discovery/Web-Content/common.txt =============================================================== Starting gobuster in directory enumeration mode =============================================================== /.hta (Status: 403) [Size: 277] /.htaccess (Status: 403) [Size: 277] /.htpasswd (Status: 403) [Size: 277] /content (Status: 301) [Size: 314] [--> http://10.10.19.199/content/] /index.html (Status: 200) [Size: 11321] /server-status (Status: 403) [Size: 277] Going to the server address, we are shown the default apache site - so we won’t find anything there ...

January 2, 2025 · 4 min · 658 words · manfcg
Disclaimer: Content on this site is for educational and informational purposes only.