Combined display of all available logs of Brunnerne. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
- 10:56, 4 August 2025 The.mikkel talk contribs created page Hydra (Created page with "'''Hydra''', often referred to as '''thc-hydra''', is a parallelized network logon cracker. It is an essential tool for any CTF player when faced with a login prompt on a network service. This page serves as a quick reference for common Hydra commands and syntax. == Core Syntax == The basic structure of a Hydra command is: <code>hydra [options] [[//service] | [service://]]<target>[:<port>]</code> The most critical options define the credential lists: * '''<code>-l <USE...") Tag: Visual edit
- 09:47, 4 August 2025 The.mikkel talk contribs created page Setoolkit (Created page with "https://www.kali.org/tools/set/") Tag: Visual edit
- 16:10, 2 May 2025 The.mikkel talk contribs created page Nmap (Created page with "== Nmap CTF Quick Reference == Common Nmap commands optimized for speed and typical CTF scenarios. === Essential Options === * <code>-p-</code> : Scan all 65535 TCP ports. * <code>-p <ports></code> : Scan specific ports (e.g., <code>-p 21,22,80,443</code>, <code>-p U:53,T:80</code>). * <code>-T4</code> : Aggressive timing (faster, good for CTFs). Use <code>-T3</code> (default) if <code>-T4</code> causes issues. * <code>-Pn</code> : Skip host discovery (Assume host...")
- 21:14, 30 April 2025 The.mikkel talk contribs created page Hashcat (Created page with "== Hashcat == '''Hashcat''' is a powerful password recovery tool, known for being one of the fastest based on its highly optimized kernel code that can leverage GPUs and other hardware accelerators. It supports a vast number of hash types and attack modes, making it a versatile tool for cracking. Hashcat is frequently used in CTFs for cracking challenges where performance is key, such as: * Cracking various password hashes much fas...")
- 21:11, 30 April 2025 The.mikkel talk contribs created page John the Ripper (Created page with "== John the Ripper == '''John the Ripper''' (often shortened to '''JtR''') is a widely used, powerful password cracking tool. It is designed to detect weak Unix passwords, but it also supports hundreds of hash and cipher types, including many commonly found in software and files (like zip files, rar files, and pdfs). It is an essential tool in cracking challenges in CTFs, often used to: * Crack password hashes found in various formats. *...")
- 21:06, 30 April 2025 The.mikkel talk contribs created page Steghide (Created page with "== Steghide == '''Steghide''' is a command-line steganography tool used to hide secret data within cover files (typically JPEG, BMP, WAV, or AU files) and extract data hidden using the same method. It often requires a passphrase for extraction. Commonly used in forensics challenges to extract hidden flags or messages from provided media files. === Basic Extraction Example === To extract potentially hidden data from a file named ''challe...")
- 06:34, 4 May 2024 The.mikkel talk contribs created page SQL Map (Initial tool page)
- 06:17, 4 May 2024 User account The.mikkel talk contribs was created automatically