You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In this Capture the Flag (CTF) event, I tested and enhanced my ethical hacking and defense capabilities by identifying and exploiting vulnerabilities in various systems. Using a "check and guess" approach, I tackled each challenge by attempting to solve potential problems, often without initially knowing the full scope of the vulnerability. This method, paired with research from online resources like articles and videos, as well as collaboration with peers, led to the discovery of multiple vulnerabilities. The exercise provided an opportunity to strengthen my proficiency in ethical hacking techniques, vulnerability detection, and defense strategies.
Languages and Utilities Used
Hackerone.com
Environments Used
Windows 11 (21H2)
Program Reflection & Code:
In this document are all the steps taken in two capture the flag (ctf) exercises on
hackerone.com. The first exercise will be for the "Trivial" exercise which contains one flag and
the second exercise will be the "Easy" exercise which contains 4 flags.
About
In this Capture the Flag (CTF) event, I assessed and improved my ethical hacking and defense skills by identifying vulnerabilities. Using a "check and guess" method, combined with online resources and peer collaboration, I successfully discovered multiple vulnerabilities, enhancing my proficiency in ethical hacking techniques and defense strategies