WinjaCTF at c0c0n : I developed an easy challenge - called “Anonymous” - the challenge was based upon browser forensics.
TL;DR Intended Way - Download the zip > Extract it > Navigate the Linux directory structure > To find a directory called .config > google-chrome > Default > Open the History File in SQL Browser > Search for URLs and upon up the URL to get a file with the name - formatted like flag....
Bug Bounty Summit CTF Writeup
The CTF is live on Hacker101 as Grayhatcon CTF – Hacker101 CTF
The CTF was built upon real vulnerabilities found during bug bounties. It had four flags – 250 points each.
Objective - Hackerone’s Username and Password database has been leaked and put on an auction. Our task was to delete the auction listing before anyone buys it.
We were given an IP, which resolved to a web application....
Hacking Is Not Black & White
This is related to a talk given by me and pre & post-event activities, that were conducted at Developer Circles, Pune and Bengaluru.
It all started with DEFCON 2020 Red Team Village CTF, my team and I reached the Top 50 and it was just amazing for all of us. It was an enriching experience, solving challenges from a wide range of categories and learning new stuff in the process. One section of the CTF dealt with Malware Analysis and I was fascinated by this domain of security and have been learning about it....