cmdshell-clear

Following on from the previous two posts and from here things start to get tough, though it still remains easy from the context of wider scale security. Its just we're now going to be tackling much harder ciphers which is very much an entry level topic, and more historical than they are practical, b...

Okay so I left off last week with a broken image, a cryptic note, and some homework, lets see how we get on and solve this one. The first thing to do is we haven't looked at that image yet, it says its corrupted but you could name it anything, it could just as easily be another file hidden in an ima...

I've got one more for you here:

Obscurity

You've managed to get yourself into some of the internal emails passing around the system and it turns out this new guy is pretty on point security-wise. After learning of the horrendous state of their admin management he's begun a crusade to get it so...

Okay so here's another puzzle I built and released some time ago:

Notepad Security

So you've been able to get a foothold onto the network, but are having difficulty accessing the root accounts. With a bit of social engineering you've learned they're locked down using randomly generated passwor...

Remember, remember, the 5th of November, the gunpowder, treason and plot. I know of no reason why the gunpowder treason should ever be forgot.

So for this month I had lots of really cool topics I wanted to share with you, but every time I started writing I quickly realised that I'm not really an e...

Now here I'd like to address a pet peeve, while I am immensely grateful to those who've come before me that helped me understand how to complete some of these tasks, there's room for improvement. Sadly unless the person making the writeup is tied to the platform in some way, it is not uncommon for t...