TryHackMe- LazyAdmin CTF Writeup (Detailed)

InfoSec Write-ups - Medium-- CTF Writeup #3Welcome Folks!We are going to LazyAdmin CTF on TryHackMe. I hope you will like the writeup. There are 2 ways we will get root. Read along you’ll find them near the end.TryHackMe | LazyAdminLet’s dive in!! Enjoy the flow!!Deploy the machine.In the meantime when you are waiting for machine to be deployed, … Continue reading TryHackMe- LazyAdmin CTF Writeup (Detailed)

Recipe for a successful phishing campaign (part 1/2)

InfoSec Write-ups - Medium-- IntroductionPhishing attacks are great first-entry vectors with technical details which are frequently overlooked by both white and blackhat hackers.Having participated in multiple phishing campaigns over the years, both in offensive as well as defensive teams, I’ve learned from trial and error a lot of these things to pay attention to. This article … Continue reading Recipe for a successful phishing campaign (part 1/2)

TryHackMe- Bounty Hacker CTF Writeup (Detailed)

InfoSec Write-ups - Medium-- CTF Writeup #2Welcome folks!!We are going to do Bounty Hacker CTF on TryHackMe.TryHackMe | Bounty HackerI always start off my CTF by creating a directory of CTF on Desktop and Nmap directory within the CTF directory.Let’s dive in!! Enjoy the flow!!Task 1. Living up to the title.Tasks List#1.1 Deploy the machineAns: No answer neededNmap Scan:We … Continue reading TryHackMe- Bounty Hacker CTF Writeup (Detailed)