Skip to content

0xdr3am/0xdr3am.github.io

 
 

Repository files navigation

Welcome to My Personal Site!

Purpose

This site serves as a platform for me to share my cybersecurity endeavors and document my journey through various Capture The Flag (CTF) challenges. It also features a blog section where I mainly write CTF writeups, providing detailed explanations of my thought process and solutions for different challenges.

About Me

I am passionate about cybersecurity and constantly strive to enhance my skills in this field. Through this site, I aim to share my knowledge, experiences, and insights with the cybersecurity community.

Blog

In the blog section, you will find a collection of CTF writeups where I dissect and analyze different challenges I have encountered. These writeups serve as a valuable resource for fellow cybersecurity enthusiasts, providing step-by-step explanations and solutions to help you improve your own skills.

Projects

Contact

Example Writeup Format

HackTheBox - Machine Name

Machine Information

  • OS: Windows/Linux
  • IP: 10.10.10.10
  • Difficulty: Easy/Medium/Hard

Enumeration

  • Ran Nmap scan and discovered open ports/services:
nmap -p- -sV 10.10.10.10
  • Enumerated the web server and found a login page at http://10.10.10.10/login

Exploitation

  • Identified a potential vulnerability in the login page.
  • Exploited the vulnerability using a SQL injection attack to bypass authentication and gain access to the admin panel.

Privilege Escalation

  • Found a vulnerable service running with root/admin privileges.
  • Exploited the vulnerability to escalate privileges and gain root/admin access.

Post-Exploitation

  • Gathered sensitive information from the compromised machine.
  • Explored the file system and discovered interesting files and directories.
  • Extracted credentials and other valuable data.

Conclusion

  • Successfully compromised the machine and achieved the objectives.
  • Documented the steps taken and findings for future reference.

Releases

No releases published

Packages

No packages published

Languages

  • SCSS 43.2%
  • HTML 42.4%
  • Ruby 8.7%
  • Shell 5.7%