reedphish
reedphish
reedphish
70 posts
puncturing security, development and life. Twitter: @reedphish
Don't wanna be here? Send us removal request.
reedphish · 3 years ago
Text
Writeup: The SANS HOLIDAY HACK CHALLENGE 2021 - Kringlecon 4 CALLING BIRDS!
Another year, another SANS Holiday Hack Challenge! Here's my writeup for the 2021 edition!
It’s that time of the year again, to reveal my writeup for the Sans Holiday Hack Challenge. This time around Sans named the game “Kringlecon 4 – Calling Birds!”. My last year submission resulted in an “Honorable Mention”. Since I have had major issues with documenting massive writeups using WordPress , I have decided to skip converting my writeup to HTML. Instead, I’ll just link to the PDF. Here��
Tumblr media
View On WordPress
0 notes
reedphish · 4 years ago
Text
Writeup: The SANS HOLIDAY HACK CHALLENGE 2020 - Kringlecon 3 French Hens!
Writeup: The SANS HOLIDAY HACK CHALLENGE 2020 – Kringlecon 3 French Hens!
It’s that time of the year again, to reveal my writeup for the Sans Holiday Hack Challenge. This time around Sans named the game “Kringlecon 3 – French Hens”. My last year submission resulted in an “Super Honorable Mention”. This year I got an “Honorable Mention” under my own name. Since I have had major issues with documenting massive writeups using WordPress , I have decided to skip converting…
Tumblr media
View On WordPress
0 notes
reedphish · 6 years ago
Text
Writeup: The SANS HOLIDAY HACK CHALLENGE 2018 - Kringlecon
My writeup for the SANS Holiday Hack Challenge 2018! What a GREAT game! #Kringlecon
The most beautiful event of 2018 has ended. Kringlecon is over! I’m a bit sad about it because the game was just so good this year! There were plenty of interesting tasks and objectives. Everything from simple assignments such as breaking out of VI to tearing apart and analysing a malware! Heck, you even had to transpose a piece of music from one key to another! Very varied indeed.
Since I have…
View On WordPress
0 notes
reedphish · 7 years ago
Text
Got slow portscans on CTF's?
Got slow portscans on CTF's? You will not believe how much this post will help you!
Aaaaaargh, my port scan take forever to complete! Heard that one before? You should have, it is a common complaint often heard between CTF rookies. Today we are looking into some ways to mitigate slow scans.
Nmap
When looking at the various complaints, Nmap seem to be the culprit. Gamers bash it for being slow and whatnot. Is it that bad? No, it isn’t. It’s all PEBCAK. It’s all about knowing how…
View On WordPress
0 notes
reedphish · 7 years ago
Text
Trollcave 1.2 - walkthrough
Been busy this weekend creating a walkthrough for Trollcave 1.2! #vulnhub
Trollcave is a vulnerable VM, in the tradition of Vulnhub and infosec wargames in general. You start with a virtual machine which you know nothing about – no usernames, no passwords, just what you can see on the network. In this instance, you’ll see a simple community blogging website with a bunch of users. From this initial point, you enumerate the machine’s running services and general…
View On WordPress
0 notes
reedphish · 7 years ago
Text
Notes on making CTF games
Notes on making CTF games
Some time ago I wrote a post named “unofficial guide to creating CTF VMs“. Since then I have been approached by random people, students I mentor and colleagues asking how to make that virtual machine vulnerable. Well, I never intended that post to reveal that. It was simply left as an exercise to the readers. Today I will lift the veil on my process for making vulnerable games. After giving it…
View On WordPress
0 notes
reedphish · 8 years ago
Text
Zico2:1 - walkthrough
Dealing with daylight saving time ... My #Zico wakthrough! #vulnhub
Description from Vulnhub: Zico is trying to build his website but is having some trouble in choosing what CMS to use. After some tries on a few popular ones, he decided to build his own. Was that a good idea? Host discovery As always, I went hunting for the target: msf > db_nmap -sn 192.168.110.0/24 msf > ping6 -I eth1 -c 2 ff02::1 IPv Address IPv4 192.168.110.28 IPv6…
View On WordPress
0 notes
reedphish · 8 years ago
Text
Bulldog 1 - walkthrough
Just finished my Bulldog 1 walkthrough! #Vulnhub
Description from Vulnhub: “Bulldog Industries recently had its website defaced and owned by the malicious German Shepherd Hack Team. Could this mean there are more vulnerabilities to exploit? Why don’t you find out? 🙂 This is a standard Boot-to-Root. Your only goal is to get into the root directory and see the congratulatory message, how you do it is up to you! Difficulty: Beginner/Intermediate,…
View On WordPress
0 notes
reedphish · 8 years ago
Text
SuperMario Host 1.0.1 - walkthrough
Got another walkthrough, this time for SuperMario Host 1.0.1 #vulnhub
Autumn is here, and also a new segment in my Vulnhub series. This time I have had a look at the SuperMario Host game and at the same time re-invented my routines. Enough chit-chat, let’s start! Away we go! Host and Service Discovery My routine for host and service discovery has changed to also cover IPv6. To make my life easier I’ve also begun to use Metasploit. $ sudo msfconsole msf > nmap -sn…
View On WordPress
1 note · View note
reedphish · 8 years ago
Text
billu b0x - walkthrough
billu b0x - walkthrough! #vulnhub
Welcome to another segment in my Vulnhub series! Today I am focusing on the billu: b0x CTF game hosted on Vulnhub. The game description didn’t say much, just that it runs standard LAMPP and the mission is to gain ROOT access. Well, then – let’s get cracking! Investigation Finding Target and Services Finding the Target: sudo nmap -sn 192.168.110.0/24 >>> 192.168.110.24 Services: $ sudo nmap…
View On WordPress
0 notes
reedphish · 8 years ago
Text
Proteus V1 - Walkthrough
Proteus V1 - Walkthrough #vulnhub
Welcome to another segment in my Vulnhub series! Haven’t had much time to focus on these lately due to work – but I managed to squeeze in some time over the last few weeks to play with the Proteus game. So here it is! Description from Vulnhub: “An IT Company implemented a new malware analysis tool for their employees to scan potentially malicious files. This PoC could be a make or break for the…
View On WordPress
0 notes
reedphish · 8 years ago
Text
DonkeyDocker 1 - Walkthrough
Starting May with a writeup for #DonkeyDocker! Having fun with #Docker. #Vulnhub
This writeup covers the Vulnhub CTF game DonkeyDocker 1 (2017), which might be the most interesting game I have played this year. In this game players are to play with Docker – a task that lies close to my heart since I love this technology. Although I am bit rusty on it ever since I quit programming and server management. Anyhow, this game is rated hard/intermediate by the creator. There’s no…
View On WordPress
0 notes
reedphish · 8 years ago
Text
Hackfest 2016 Orcus – walkthrough
I'm on a roll! Here's a walkthrough for #Hackfest 2016 #Orcus!
Still enjoying some days off from work because of Easter holiday. To fill my time even more, I decided to spend some time with the hackfest2016: Orcus game. The difficulty level on this one is rated hard, I expect it to be somewhat harder than both hackfest2016: Sedna and Quaoar game. Description From Vulnhub: If youre stuck enumerate more! Seriously take each service running on the system and…
View On WordPress
0 notes
reedphish · 8 years ago
Text
Hackfest 2016 Sedna – walkthrough
Enjoying some days off from work. Here's a walkthrough for #Hackfest 2016 #Sedna!
At the moment I am enjoying some days off from work because of Easter holiday. To fill my time I decided to spend some time with the hackfest2016: Sedna game. The difficulty level on this one is rated medium, I expect it to be somewhat harder the hackfest2016: Quaoar game. Description From Vulnhub: There are multiple way to root this box, if it should work but doesn’t try to gather more info…
View On WordPress
0 notes
reedphish · 8 years ago
Text
Hackfest 2016 Quaoar - walkthrough
Dazing in the shade. Here's a walkthrough for #Hackfest 2016 #Quaoar!
Another week, another CTF under my belt. Been doing a lot of CTF games the past months. This time I took some time off my schedule to play with the hackfest2016: Quaoar game. The difficulty level on this one is pretty low, which suited me fine this time around. It’s nice to have something to keep oneself occupied that doesn’t require much braining. Anyway, lets cut to the chase! Description From…
View On WordPress
0 notes
reedphish · 8 years ago
Text
Ew_Skuzzy 1 - walkthrough
Been productive! Here's walkthrough for Ew_Skuzzy 1! #vulnhub
Today I am sharing my work log for the “Ew_Skuzzy: 1��� CTF game. This game was released only recently, on the 17th of March 2017. As of time of writing, there haven’t been much information released about it. That adds another dimension to solving it and suits me fine. As always I have based my work on Parrot instead of Kali Linux. These distribution appears more or less the same and you should…
View On WordPress
0 notes
reedphish · 8 years ago
Text
Wallaby's Nightmare - Walkthrough
Another walkthrough? Yup! This time Wallaby's Nightmare! #vulnhub
This segment of my Vulnhub series covers my walkthrough for the “Wallaby’s Nightmare (v1.0.2)” game. Finding Host and uncover services As always, I began finding the address of the game: Command sudo nmap -sn 192.168.110.0/24 In my case, target got assigned IP address 192.168.110.11. Then moved on uncovering services: Command sudo nmap -p1-65535 -A -T4 -sS 192.168.110.11 Target did not expose…
View On WordPress
0 notes