Capture The Flag

Lame

In this blog, we explore the process of identifying and exploiting vulnerabilities in Samba using the CVE-2007-2447 exploit. By leveraging Metasploit, we demonstrate how to gain unauthorized access to a server through the manipulation of shell metacharacters. This post provides a detailed, step-by-step guide on executing the exploit and capturing the root flag. Perform an…

Blue

This walkthrough demonstrates exploiting a vulnerable Windows 7 machine using the infamous EternalBlue (MS17-010) vulnerability. Initial nmap reconnaissance reveals an SMB service with critical misconfigurations including disabled message signing, guest account access, and an outdated operating system. After enumerating SMB shares and identifying the vulnerability, the machine is successfully compromised using Metasploit’s EternalBlue exploit module,…

Campfire

Analysis of memory dump (recollection.bin) from compromised Windows 7 SP1 machine (USER-PC) revealed evidence of multi-stage attack including clipboard hijacking, credential exfiltration, malware execution, and data theft via network shares. Timeline indicates attacker gained initial access and executed obfuscated PowerShell commands to establish persistence and exfiltrate sensitive files.