• Toggle sidebar
Necrum Security Labs logo
  • Blog
  • Portfolio
  • 3 scary tools that use Shodan search engine 3 ways to become root by exploiting the .bashrc file A hidden web shell in the plug-in wireless Planex MZK-DP150N | CVE-2021-37289 Are professional hackers also excellent magicians? Bob’s Cap - CTF Challenge Build your own WiFi Pineapple Tetra for $7. Crack Me 1 - CTF Challenge Crack Me 2 - CTF Challenge CTF Flag Mart - CTF Challenge Damn Cheap Cipher 2 - CTF Challenge Emoji - CTF Challenge Flask Task - CTF Challenge Hacker Kombat (THE GAME) - CTF Challenge Hackermon - CTF Challenge I Love Listings - CTF Challenge JabberJaw - Convert your router in portable network attack device. Not So Simple Cipher - CTF Challenge Pug a Plenty - CTF Challenge Secure any URL or Qr Code with a password! Simple Cipher - CTF Challenge Triva Unsecured - CTF Challenge VPN Ivacy, insecure design vulnerability discovered. Zipper - CTF Challenge
    Show All CTF Cryptography Forensics Hak5 JabberJaw MIPS_24Kc OpenWrt Privacy Reconnaissance Reverse Engineering SharkJack Shell Shodan Tools Web WiFi WiFi Pineapple backdoor bash cve script vulnerability
    I Love Listings - CTF Challenge

    Sunday, May 30th 2021
    CTF, Reconnaissance

    For this really easy challenge we can download a compressed zip file called "CTF_1.zip". Let’s extract it and open it.


    0xSamy_ NeroTeam Security Labs (NSLabs).
    © All right reserved 2023