Toggle menu
Toggle preferences menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

User contributions for The.mikkel

A user with 17 edits. Account created on 4 May 2024.
Search for contributionsExpandCollapse
⧼contribs-top⧽
⧼contribs-date⧽

4 August 2025

2 May 2025

  • 18:1118:11, 2 May 2025 diff hist +4 Hashcat No edit summary current Tag: Visual edit
  • 16:1016:10, 2 May 2025 diff hist +4,457 N Nmap Created page with "== Nmap CTF Quick Reference == Common Nmap commands optimized for speed and typical CTF scenarios. === Essential Options === * <code>-p-</code> : Scan all 65535 TCP ports. * <code>-p <ports></code> : Scan specific ports (e.g., <code>-p 21,22,80,443</code>, <code>-p U:53,T:80</code>). * <code>-T4</code> : Aggressive timing (faster, good for CTFs). Use <code>-T3</code> (default) if <code>-T4</code> causes issues. * <code>-Pn</code> : Skip host discovery (Assume host..."

30 April 2025

  • 21:2421:24, 30 April 2025 diff hist +8 Tools No edit summary
  • 21:2221:22, 30 April 2025 diff hist +6,931 Tools No edit summary
  • 21:1421:14, 30 April 2025 diff hist +2,742 N Hashcat Created page with "== Hashcat == '''Hashcat''' is a powerful password recovery tool, known for being one of the fastest based on its highly optimized kernel code that can leverage GPUs and other hardware accelerators. It supports a vast number of hash types and attack modes, making it a versatile tool for cracking. Hashcat is frequently used in CTFs for cracking challenges where performance is key, such as: * Cracking various password hashes much fas..."
  • 21:1121:11, 30 April 2025 diff hist +1,765 N John the Ripper Created page with "== John the Ripper == '''John the Ripper''' (often shortened to '''JtR''') is a widely used, powerful password cracking tool. It is designed to detect weak Unix passwords, but it also supports hundreds of hash and cipher types, including many commonly found in software and files (like zip files, rar files, and pdfs). It is an essential tool in cracking challenges in CTFs, often used to: * Crack password hashes found in various formats. *..."
  • 21:0621:06, 30 April 2025 diff hist +819 N Steghide Created page with "== Steghide == '''Steghide''' is a command-line steganography tool used to hide secret data within cover files (typically JPEG, BMP, WAV, or AU files) and extract data hidden using the same method. It often requires a passphrase for extraction. Commonly used in forensics challenges to extract hidden flags or messages from provided media files. === Basic Extraction Example === To extract potentially hidden data from a file named ''challe..."
  • 20:5920:59, 30 April 2025 diff hist +253 Tools No edit summary

4 May 2024