FlagYard — Web — GlideExploiting path traversal in a tar file extraction process to overwrite a rendered template, leading to Server-Side Template Injection…5d ago5d ago
FlagYard —Studio | Web Exploitation | CTF Challenge WriteupExploiting a path traversal vulnerability to upload a malicious file, leveraged local file inclusion (LFI) to execute it, used Server-Side…Nov 23, 2024Nov 23, 2024
FlagYard — Feedback | Web Exploitation | CTF Challenge WriteupWe are provided with the server-side source code. Let’s look into it.Nov 10, 2024Nov 10, 2024
CodeCon-CUI’24 CTF | Late night writeup | WebWe are provided with a zip file containing the following files:Oct 15, 2024Oct 15, 2024
TheCyberThesis | Web Challenges | WriteupsThese are the writeups for the web challenges I created in TheCyberThesis CTF.Oct 4, 2024Oct 4, 2024
FlagYard — nooter | Web ExploitationAfter starting the CTF instance, we are greeted with a simple registration page. At first glance, this seems like a basic “notes” website…Sep 17, 20243Sep 17, 20243
Office 365 Error Code 0–2054 | FIXED | SOLUTIONIn this article, I’ll share how I resolved the ‘Couldn’t install — The configuration file wasn’t specified’ error with Error Code: 0–2054…Apr 4, 2024Apr 4, 2024
Trickster | Web Exploitation | picoCTF 2024 | File Upload VulnerbilityDescriptionMar 24, 2024Mar 24, 2024