Home
The Cyber Bolg
Cancel

Walkthrough on OWASP Top 10 2021 Release for Beginners

Today we’ll discuss The Open Worldwide Application Security Project (OWASP) top 10 vulnerabilities in the web applications which noticed, collected and organized by volunteers who work in major tec...

Reflected XSS protected by very strict CSP, with dangling markup attack

Today is nearly two years since the first Portswigger Web Security was solved, I solved the last one. In this blog post, I’ll share how I solve it. Description of the Lab Lab Level: Expert T...

Snyk Fetch the Flag CTF 2023 Dive Into Web Challenges

I’m thrilled to announce our latest achievement – a spectacular performance by our team, Creeprs_249, in the heart-pounding “Fetch the Flag CTF” competition. Organized by Snyk and John Hammond, thi...

NoteHarbor Web Challenge Writeup Cyber Talents 2023

I’m thrilled to share that our outstanding team, creeprs_249, has reached an impressive milestone! 🎉 We secured the 50th position among around 450 teams hailing from Arabian countries in the presti...

Black Hat MEA 2023 Qualifications CTF Easy Web Challenges Walkthrough

On October 8th, at 13:00 GMT, the Black Hat MEAQ Qualifications CTF commenced. Alongside my brilliant team, “creepers_249,” I actively participated, putting forth our best efforts to secure those e...

Mastering PicoCTF Web Exploits Walkthrough & BlackHat CTF Prep

Although many people in the cybersecurity industry argue that playing Capture The Flag is not the most realistic scenario for attacks and can often be unsolvable unless you follow the exact path of...

Cyber Alchemy Unlocking the Secrets of Hacking

When people hear the word “hacker,” they often envision an individual who wears a hoodie, resides in a dimly lit room, and types rapidly on a keyboard with green terminals displayed on five monitor...

TryHackMe - Relevant Room Walkthrough

Hello everyone, today we are solving Relevant room from TryHackMe. Scope The client has asked that you secure two flags (no location provided) as proof of exploitation: User.txt ...