Toggle menu
Toggle preferences menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

New pages

More actions
New pages
Hide registered users | Hide bots | Hide redirects

4 August 2025

  • 10:5610:56, 4 August 2025 Hydra (hist | edit) [8,640 bytes] The.mikkel (talk | contribs) (Created page with "'''Hydra''', often referred to as '''thc-hydra''', is a parallelized network logon cracker. It is an essential tool for any CTF player when faced with a login prompt on a network service. This page serves as a quick reference for common Hydra commands and syntax. == Core Syntax == The basic structure of a Hydra command is: <code>hydra [options] [[//service] | [service://]]<target>[:<port>]</code> The most critical options define the credential lists: * '''<code>-l <USE...") Tag: Visual edit
  • 09:4709:47, 4 August 2025 Setoolkit (hist | edit) [31 bytes] The.mikkel (talk | contribs) (Created page with "https://www.kali.org/tools/set/") Tag: Visual edit

2 May 2025

  • 17:3517:35, 2 May 2025 Binwalk (hist | edit) [4,646 bytes] Brunn (talk | contribs) (Created page with "== Binwalk CTF Quick Reference == === Introduction === Binwalk is a powerful tool primarily used for analyzing binary files to find embedded files and executable code within them. It scans for file signatures (magic bytes) that indicate the start of known file types. In CTFs, Binwalk is essential for: * Finding hidden files packed inside other files (e.g., images hidden in documents, archives hidden in executables, firmware analysis). * Carving out embedded data struct...")
  • 17:3117:31, 2 May 2025 ExifTool (hist | edit) [5,917 bytes] Brunn (talk | contribs) (Created page with "== ExifTool CTF Quick Reference == === Introduction === ExifTool, created by Phil Harvey, is an extremely powerful command-line application and Perl library for reading, writing, and manipulating '''metadata''' in a vast range of file types. Metadata is "data about data" – information embedded within a file that describes its properties, origin, creator, location, and more. In CTFs, ExifTool is indispensable for: * Extracting hidden flags or clues embedded in metadat...")
  • 16:1016:10, 2 May 2025 Nmap (hist | edit) [4,489 bytes] The.mikkel (talk | contribs) (Created page with "== Nmap CTF Quick Reference == Common Nmap commands optimized for speed and typical CTF scenarios. === Essential Options === * <code>-p-</code> : Scan all 65535 TCP ports. * <code>-p <ports></code> : Scan specific ports (e.g., <code>-p 21,22,80,443</code>, <code>-p U:53,T:80</code>). * <code>-T4</code> : Aggressive timing (faster, good for CTFs). Use <code>-T3</code> (default) if <code>-T4</code> causes issues. * <code>-Pn</code> : Skip host discovery (Assume host...")

30 April 2025

  • 21:1421:14, 30 April 2025 Hashcat (hist | edit) [2,794 bytes] The.mikkel (talk | contribs) (Created page with "== Hashcat == '''Hashcat''' is a powerful password recovery tool, known for being one of the fastest based on its highly optimized kernel code that can leverage GPUs and other hardware accelerators. It supports a vast number of hash types and attack modes, making it a versatile tool for cracking. Hashcat is frequently used in CTFs for cracking challenges where performance is key, such as: * Cracking various password hashes much fas...")
  • 21:1121:11, 30 April 2025 John the Ripper (hist | edit) [1,814 bytes] The.mikkel (talk | contribs) (Created page with "== John the Ripper == '''John the Ripper''' (often shortened to '''JtR''') is a widely used, powerful password cracking tool. It is designed to detect weak Unix passwords, but it also supports hundreds of hash and cipher types, including many commonly found in software and files (like zip files, rar files, and pdfs). It is an essential tool in cracking challenges in CTFs, often used to: * Crack password hashes found in various formats. *...")
  • 21:0621:06, 30 April 2025 Steghide (hist | edit) [862 bytes] The.mikkel (talk | contribs) (Created page with "== Steghide == '''Steghide''' is a command-line steganography tool used to hide secret data within cover files (typically JPEG, BMP, WAV, or AU files) and extract data hidden using the same method. It often requires a passphrase for extraction. Commonly used in forensics challenges to extract hidden flags or messages from provided media files. === Basic Extraction Example === To extract potentially hidden data from a file named ''challe...")