Category: Writeups
All posts in the "Writeups" category
4n6Post Artifact, CTF Write ups and AI Tools
Bitlocker 1
Description Jacky is not very knowledgable about the best security passwords and used a simple password to encrypt their BitLocker drive. See if you …
Bitlocker 2
Description Author: Venax Jacky has learnt about the importance of strong passwords and made sure to encrypt the BitLocker drive with a very long and …
CTF Write-Ups
CTF Resources
PicoCTF
PicoCTF is a beginner-friendly Capture The Flag (CTF) competition designed to teach cybersecurity concepts through hands-on challenges. It is hosted …
Event Viewing
A detailed writeup for the “Event Viewing” challenge from picoCTF, covering the analysis of Windows Event Logs to uncover hidden flags.
Ph4nt0m 1ntrud3r
Description Author: Prince Niyonshuti N. A digital ghost has breached my defenses, and my sensitive data has been stolen! 😱💻 Your mission is to …
RED
Description Author: Shuailin Pan (LeConjuror) Description RED, RED, RED, RED Download the image: …
Beginner Track - Hackademy
You know, I almost nicknamed you The Kid. But they told me that you are skilled. Let’s put this to the test with some fundamentals. Training module: …
ChatGPT
Potential Flag Data md 2 lines NOHRVPX11JGCF LYRZIDU8LV9478OA Flag 1 Click to reveal the final flag flag 1 lines FLAG-LYRZIDU8LV9478OA Your team …
Container
Small Container While the Bonsecours is obviously a cruise ship, civilian ships can be chartered to carry cargo in containers. These containers are …
Crew Members Hub
Challenge Context The Wiz, I’ve got a special task that requires every bit of your brain power. I need you to infiltrate the CVSS Bonsecours Crew …
Gift Shop
Everybody can participate in games and stupid activities aboard the ship and get prize money that can be cashed in at a Gift Shop. Limbo dancing is …
Internet Access
Cruises are not known for their generosity. They’ll nickel-and-dime you at every opportunity. They’re out here to make money, just like us… It is by …
Life Saving Device
The cruise makes stops in coastal cities, and provide a pin badge per cabin to help passengers recognize each other, and for the crew to identify …
NorthSec
The NorthSec Website
NorthSec 2025
NorthSec < NSEC 2025
Number Station - Sync With The Dealers
Step 1 The casino dealers are key allies in ensuring the success of the heist, but you’ll need to coordinate with them covertly. We’ve been working to …
Packing Heat
You don’t need to know why, but when time will come, I’ll need a weapon and ammo. Bringing something onboard this high security ship was impossible, …
Pursuer Copter
Unfortunately I dont have the context and files. Just an image of the file and the flag. Click to reveal the flag flag 1 lines FLAG-WEWILLNEEDACHOPPER …
SailorKidz
I dont have the pre-context unfortunately. I do have the image initially provided. This was solved but I think I lost the results I had. The …
Ship the add-on
The steps that were taken to get our access cards were colossal. While we’re working on making it a skeleton key, members of the crew that will see …
Welcome Aboard
I have assigned a cabin to you. This is your base of operations. It’s not the biggest cabin, but you should make yourself at home, but not too much. …
Welcome To The CTF
Welcome to the CTF! To make your life easier with some of the challenges, a shell server is available for your use. ssh root@shell.ctf Password: …
Learning Tools
Disk, disk, sleuth! II
Description All we know is the file with the flag is named down-at-the-bottom.txt… Disk image: dds2-alpine.flag.img.gz …
Enhance!
Description Download this image file and find the flag. Download image file https://artifacts.picoctf.net/c/100/drawing.flag.svg Info This one was …
extensions
Description This is a really weird text file TXT? Can you find the flag? Info Looking at the file, it actually claims to be a PNG. So just change the …
File Types
Description This file was found among some files marked confidential but my pdf reader cannot read it, maybe yours can. You can download the file from …
hideme
Description Every file gets a flag. The SOC analyst saw one image been sent back and forth between two people. They decided to investigate and found …
