Home Home
Scavenger Security
Cancel

2020 Metasploit Community CTF – Queen of Spades (port 8202) [Web]

Port 8202 hosts a web application with a single login form. Trying to login with random credentials, we observed that it calls a GraphQL API to authenticate against the remote server. With the f...

2020 Metasploit Community CTF - 9 of Clubs (port 1337) [PWN]

Port 1337 hosts a TCP service that prompts the user to choose one of several options, and later takes some text input. After trying several techniques, we discovered that it had a format string vul...

2020 Metasploit Community CTF – 8 of Spades (port 1080) [Networks]

Port 1080 shows a SOCKS 5 service running. We tried establishing a connection through this service, but upon failure we thought it was a false positive brought by the default nmap scripts, so we...

2020 Metasploit Community CTF - Ace of Clubs (port 9009) [PrivEsc]

Port 9009 shows an OpenSSH service running. Our first step was to brute force the login, which resulted in us gaining access with the trivial user/password combination of admin:password. After a...

DekraCTF - Weird Chall [PWN]

Weird Chall is an exploitable binary that uses libseccomp to filter Linux syscalls. The difficulty, then, relies on bypassing these restrictions. Let’s take a look at the main function of the bi...

DekraCTF - Goverse [IoT]

Goverse is a reversing challenge that got 11 solves. It MIPS binary written in Go. It is statically linked with the Go runtime, so we can run the binary file with qemu without needing to install...

DekraCTF - Echopwn [PWN]

Echopwn is a simple binary that reads the user input twice and reflects it. Using checksec we can see that most memory protections are enabled, including stack canaries and address randomization...