[{"id":1130,"link":"https:\/\/www.thegeekghost.com\/2022\/11\/03\/hackfest-beginner-ctf-2022\/","name":"hackfest-beginner-ctf-2022","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2022\/11\/hfctf.png","alt":""},"title":"Hackfest Beginner CTF 2022","excerpt":"","content":"Writeup for Hackfest 2022 - Resurrection Edition Beginner CTF: Hackfest CTF Tracks Beginner - AWS (by dax) 01 - AWS whoami (5) 02 - AWS cat mysecrets.txt (6) 03 - AWS ls and cp (7) 04 - AWS mongodump (8) 05 - AWS sudo (9) 06 - AWS curl (10) 07 - AWS python3 my_script.py (6) 08 - AWS docker","author":{"name":"Marghost","link":"https:\/\/www.thegeekghost.com\/author\/marghost\/"},"date":"Nov 3, 2022","dateGMT":"2022-11-03 02:23:34","modifiedDate":"2023-06-29 17:36:20","modifiedDateGMT":"2023-06-29 17:36:20","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.thegeekghost.com\/tag\/2022\/' rel='post_tag'>2022<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/ctf\/' rel='post_tag'>ctf<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/hackfest\/' rel='post_tag'>hackfest<\/a>"},"readTime":{"min":1,"sec":17},"status":"publish"},{"id":945,"link":"https:\/\/www.thegeekghost.com\/2022\/02\/13\/installing-gentoo-on-vmware-workstation-16\/","name":"installing-gentoo-on-vmware-workstation-16","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2022\/02\/gentoo-512_30714.png","alt":""},"title":"Installing Gentoo on VMware workstation 16","excerpt":"","content":"First of all... I got peer pressured into this, I am not doing this out of free will! Just kidding, in this blog post I will summerize my first journey with Gentoo and how to set it up inside a VM with VMware workstation version 16. This guide will help you setup a virtual instance of Gentoo and i suggest","author":{"name":"Marghost","link":"https:\/\/www.thegeekghost.com\/author\/marghost\/"},"date":"Feb 13, 2022","dateGMT":"2022-02-13 20:27:45","modifiedDate":"2023-06-29 17:36:22","modifiedDateGMT":"2023-06-29 17:36:22","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/linux\/\" rel=\"category tag\">Linux<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/linux\/\" rel=\"category tag\">Linux<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.thegeekghost.com\/tag\/gentoo\/' rel='post_tag'>gentoo<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/install\/' rel='post_tag'>install<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/linux\/' rel='post_tag'>linux<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/vmware\/' rel='post_tag'>vmware<\/a>"},"readTime":{"min":11,"sec":22},"status":"publish"},{"id":828,"link":"https:\/\/www.thegeekghost.com\/2022\/01\/27\/how-to-monitor-your-windows-machine-with-splunk\/","name":"how-to-monitor-your-windows-machine-with-splunk","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2022\/01\/splunklogo.jpg","alt":""},"title":"How-to monitor your windows machine with splunk","excerpt":"","content":"Why use Splunk? Using Splunk to monitor your computer or vps is free, easy and let you learn about one of the best SIEM tool available on the market (as for now 2022). In this post I will share some of my personal Splunk configurations and alerts so you can start monitoring what is going on in your windows machine","author":{"name":"Marghost","link":"https:\/\/www.thegeekghost.com\/author\/marghost\/"},"date":"Jan 27, 2022","dateGMT":"2022-01-27 02:28:19","modifiedDate":"2023-06-29 17:36:23","modifiedDateGMT":"2023-06-29 17:36:23","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.thegeekghost.com\/tag\/alert\/' rel='post_tag'>alert<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/query\/' rel='post_tag'>query<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/server\/' rel='post_tag'>server<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/splunk\/' rel='post_tag'>splunk<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/vps\/' rel='post_tag'>vps<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/windows\/' rel='post_tag'>windows<\/a>"},"readTime":{"min":7,"sec":56},"status":"publish"},{"id":333,"link":"https:\/\/www.thegeekghost.com\/2018\/04\/02\/way-to-find-clues-inside-a-ctf-box\/","name":"way-to-find-clues-inside-a-ctf-box","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2022\/01\/pixelatedpentest_logo.png","alt":""},"title":"Way to find clues inside a ctf box","excerpt":"","content":"we find a file that was created by the maker in the process of creation ie : flag.txt. Flag.txt was created 22 august 2017 find \/ -type f -newermt 2017-08-20 ! -newermt 2017-08-24 -ls 2>\/dev\/null We see all files that have changed between 20-08 and 24-08 (if needed we can change the range) With that we can see interesting changes","author":{"name":"Marghost","link":"https:\/\/www.thegeekghost.com\/author\/marghost\/"},"date":"Apr 2, 2018","dateGMT":"2018-04-02 16:13:07","modifiedDate":"2023-06-29 17:53:28","modifiedDateGMT":"2023-06-29 17:53:28","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":19},"status":"publish"},{"id":309,"link":"https:\/\/www.thegeekghost.com\/2018\/03\/19\/wip-linux-pentest-cheatsheet\/","name":"wip-linux-pentest-cheatsheet","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2017\/09\/linux-penguin-blackboard.jpg","alt":""},"title":"WIP - Linux pentest cheatsheet","excerpt":"","content":"Intended for personal use, i use many websites and pages from my blog, i just want to have all those things into one cozy page. Enumeration Port \u00adnmap Simple quick and dirt with os and version detection : [code]nmap -A -O -v -T4 X.X.X.X[\/code] A more complete one : [code]nmap -sV -sC -oA tcpnmap X.X.X.X[\/code] Custom one to see if","author":{"name":"Marghost","link":"https:\/\/www.thegeekghost.com\/author\/marghost\/"},"date":"Mar 19, 2018","dateGMT":"2018-03-19 15:47:57","modifiedDate":"2023-06-29 17:36:38","modifiedDateGMT":"2023-06-29 17:36:38","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/linux\/\" rel=\"category tag\">Linux<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tools\/\" rel=\"category tag\">Tools<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/linux\/\" rel=\"category tag\">Linux<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tools\/\" rel=\"category tag\">Tools<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.thegeekghost.com\/tag\/cheatsheet\/' rel='post_tag'>cheatsheet<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/linux\/' rel='post_tag'>linux<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/pentest\/' rel='post_tag'>pentest<\/a>"},"readTime":{"min":2,"sec":1},"status":"publish"},{"id":302,"link":"https:\/\/www.thegeekghost.com\/2017\/09\/01\/a-journey-into-windows-pentesting\/","name":"a-journey-into-windows-pentesting","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2017\/09\/hacking-windows-using-linux.jpg","alt":""},"title":"A journey into Windows pentesting.","excerpt":"","content":"I did root many windows rig in the last week.\u00a0 You can practice your skill too, just go to hackthebox.eu.\u00a0 Here i will not tell you how specificity root those vulnerable windows os, i just want to keep some of the basics that i learned from this. As expected the info gathering is the same nmap nikto dirb etc. The","author":{"name":"Marghost","link":"https:\/\/www.thegeekghost.com\/author\/marghost\/"},"date":"Sep 1, 2017","dateGMT":"2017-09-01 16:59:38","modifiedDate":"2023-06-29 17:36:40","modifiedDateGMT":"2023-06-29 17:36:40","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.thegeekghost.com\/tag\/metasploit\/' rel='post_tag'>metasploit<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/pentest\/' rel='post_tag'>pentest<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/root\/' rel='post_tag'>root<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/windows\/' rel='post_tag'>windows<\/a>"},"readTime":{"min":2,"sec":13},"status":"publish"},{"id":283,"link":"https:\/\/www.thegeekghost.com\/2017\/08\/23\/ctf-analougepond-from-knightmare2600-vulnhub\/","name":"ctf-analougepond-from-knightmare2600-vulnhub","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2022\/01\/pixelatedpentest_logo.png","alt":""},"title":"CTF Analougepond from @knightmare2600 (VulnHub)","excerpt":"","content":"It has been a wile since i solved a CTF. I decided to try to crack the analougepond from @knightmare2600. First you need to put an appropriate soundtrack for this VM. [code]Nmap udp : root@kali:~# nmap -sS -sU -T4 -A -v 192.168.1.14 Starting Nmap 7.60 ( https:\/\/nmap.org ) at 2017-08-20 13:37 EDT NSE: Loaded 146 scripts for scanning. NSE: Script","author":{"name":"The Geek Ghost","link":"https:\/\/www.thegeekghost.com\/author\/t-g-g\/"},"date":"Aug 23, 2017","dateGMT":"2017-08-23 01:34:14","modifiedDate":"2023-06-29 17:52:37","modifiedDateGMT":"2023-06-29 17:52:37","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":53},"status":"publish"},{"id":270,"link":"https:\/\/www.thegeekghost.com\/2017\/03\/24\/ctf-ew_skuzzy-from-vortexau-vulnhub\/","name":"ctf-ew_skuzzy-from-vortexau-vulnhub","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2017\/03\/ew_skuzzy-02.png","alt":""},"title":"CTF Ew_Skuzzy from @vortexau (Vulnhub)","excerpt":"","content":"You can find it on Vulnhub HERE. As usual you can contact me on twitter @marghost. First thing first nmap [code]root@kali:~# nmap -T4 -A -v 192.168.1.23 Starting Nmap 7.25BETA2 ( https:\/\/nmap.org ) at 2017-03-23 23:32 EDT NSE: Loaded 140 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 23:32 Completed NSE at 23:32, 0.00s elapsed Initiating NSE at 23:32 Completed","author":{"name":"The Geek Ghost","link":"https:\/\/www.thegeekghost.com\/author\/t-g-g\/"},"date":"Mar 24, 2017","dateGMT":"2017-03-24 04:51:17","modifiedDate":"2022-11-03 01:33:41","modifiedDateGMT":"2022-11-03 01:33:41","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":11,"sec":16},"status":"publish"},{"id":250,"link":"https:\/\/www.thegeekghost.com\/2017\/03\/22\/ctf-orcus-from-viper-hackfest-2016\/","name":"ctf-orcus-from-viper-hackfest-2016","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2017\/03\/orcus-01.png","alt":""},"title":"CTF Orcus from Viper (hackfest 2016)","excerpt":"","content":"Hello guys,\u00a0 it\u2019s my third Vulnerable VM by @ViperBlackSkull if you need more information you can reach me on twitter at @marghost.\u00a0 You can get the virtual machine HERE. So lets get started. This vm is tagged as hard and it is!\u00a0 First i did a nmap [code languge=\"bash\"]root@kali:~# nmap -T4 -A -v 192.168.1.21 Starting Nmap 7.25BETA2 ( https:\/\/nmap.org )","author":{"name":"The Geek Ghost","link":"https:\/\/www.thegeekghost.com\/author\/t-g-g\/"},"date":"Mar 22, 2017","dateGMT":"2017-03-22 22:05:11","modifiedDate":"2022-01-04 05:18:59","modifiedDateGMT":"2022-01-04 05:18:59","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":15,"sec":15},"status":"publish"},{"id":220,"link":"https:\/\/www.thegeekghost.com\/2017\/03\/19\/ctf-sedna-from-viper-hackfest-2016\/","name":"ctf-sedna-from-viper-hackfest-2016","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2017\/03\/wp-1490109887357.jpg","alt":""},"title":"CTF Sedna from Viper (hackfest 2016)","excerpt":"","content":"Hi everyone, I did the first Vuln VM from hackfest 2016 not long ago and i want to try this one now. It's the second one by @ViperBlackSkull and it is the second walkthrough for me so if you need more information you can reach me on twitter at @marghost.\u00a0 You can get the virtual machine HERE. So lets get","author":{"name":"The Geek Ghost","link":"https:\/\/www.thegeekghost.com\/author\/t-g-g\/"},"date":"Mar 19, 2017","dateGMT":"2017-03-19 05:37:05","modifiedDate":"2022-01-04 05:18:59","modifiedDateGMT":"2022-01-04 05:18:59","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":7,"sec":58},"status":"publish"}]