AWS Big IAM Challenge
This is a WriteUp of the WIZ “The Big IAM Challenge”. The challenge is a cloud security CTF about identifiying and exploiting AWS IAM misconfigurations in s...
This is a WriteUp of the WIZ “The Big IAM Challenge”. The challenge is a cloud security CTF about identifiying and exploiting AWS IAM misconfigurations in s...
This is a WriteUp of the WIZ “EKS Cluster Games”. The games are a cloud security CTF about identifiying and exploiting common AWS EKS security issues in fiv...
This is a WriteUp of the HTB Challenge Toxic. The challenge is delivered with the full source code of the web application, written in PHP.
Enumeration An initial port scan showed two open ports: 22 and 80. The website hosts some flavor text and a login page. ``` $ nmap -sV -sC -Pn -p1-65535 -o ...
Enumeration Scanning sau.htb showed two open ports, 22 and 55555 and two filtered ports 80 and 8338. Receiving a filtered response indicates, that the reque...
Enumeration An initial port scan showed two open ports: 22 and 80. The main website on devvortex.htb only hosts some flavor text. ``` $ nmap -sV -sC -Pn -p1...
Enumeration An initial port scan showed three open ports, SSH and two HTTP ports. Port 80 being an Apache reverse proxy to the Node.js server running on por...
During my exchange semester I took the course “Penetration Testing”, which focused on the approaches an intruder might take to gain access to systems and wha...
This is a WriteUp of the HTB Challenge Toxic. The challenge is delivered with the full source code of the web application, written in PHP.
Enumeration An initial port scan showed two open ports: 22 and 80. The website hosts some flavor text and a login page. ``` $ nmap -sV -sC -Pn -p1-65535 -o ...
Enumeration Scanning sau.htb showed two open ports, 22 and 55555 and two filtered ports 80 and 8338. Receiving a filtered response indicates, that the reque...
Enumeration An initial port scan showed two open ports: 22 and 80. The main website on devvortex.htb only hosts some flavor text. ``` $ nmap -sV -sC -Pn -p1...
Enumeration An initial port scan showed three open ports, SSH and two HTTP ports. Port 80 being an Apache reverse proxy to the Node.js server running on por...
During my exchange semester I took the course “Deep Neural Networks”, which focused on the foundations of neural networks and deep learning. The course cover...
During my exchange semester I took the course “Cloud Infrastructure”, which focused on giving an introduction to Kubernetes and applying the aquired knowledg...
During my exchange semester I took the course “Machine Vision”, which focused on the fundamental concepts and techniques of imaging and image processing oper...
During my exchange semester I took the course “Penetration Testing”, which focused on the approaches an intruder might take to gain access to systems and wha...
This is a WriteUp of the WIZ “The Big IAM Challenge”. The challenge is a cloud security CTF about identifiying and exploiting AWS IAM misconfigurations in s...
I had a few thoughts and ideas in my head as of recently:
This is a WriteUp of the WIZ “EKS Cluster Games”. The games are a cloud security CTF about identifiying and exploiting common AWS EKS security issues in fiv...
During my exchange semester I took the course “Cloud Infrastructure”, which focused on giving an introduction to Kubernetes and applying the aquired knowledg...
During my exchange semester I took the course “Deep Neural Networks”, which focused on the foundations of neural networks and deep learning. The course cover...
During my exchange semester I took the course “Machine Vision”, which focused on the fundamental concepts and techniques of imaging and image processing oper...