Tag: drunkencloud
All the articles with the tag "drunkencloud".
Forensics Basics
Published: at 04:55 PMUncover the digital footprints left by attackers through the fascinating world of Forensics. Explore techniques such as Metadata analysis, File Formats, Steganography, and Networking. Gain insights into blue teaming in cybersecurity, learning to analyze event logs, detect hidden data, and more. Forensics CTF challenges provide a gateway to a broader understanding of cybersecurity.
Reverse Engineering Basics
Published: at 04:55 PMDecipher the inner workings of compiled programs through Reverse Engineering. Transform machine code back into a human-readable format, understanding program functionality and identifying vulnerabilities. While the challenges may involve analyzing assembly code, this skill is invaluable for those interested in malware analysis or game hacking.
Web Exploitation basics
Published: at 04:55 PMEmbark on a journey into the dynamic world of Web Exploitation. Websites are treasure troves of vulnerabilities waiting to be uncovered. Explore challenges involving SQL Injection, Command Injection, Cross-Site Scripting, and more. Unearth hidden flags within source codes and learn the art of exploiting bugs to gain higher-level privileges. Web Exploitation CTFs are a gateway to understanding and securing the intricate web landscape.