Skip to content

Dfpello/CTF-Writeups

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

2 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

Cybersecurity Portfolio: Technical Write-ups ๐Ÿ›ก๏ธ

Welcome to my security research and CTF repository. This space is dedicated to documenting the exploitation and remediation of various machines from platforms like DockerLabs, HackTheBox, and TryHackMe.

The primary focus is to demonstrate a structured, professional methodology in Penetration Testing and Vulnerability Assessment.


๐Ÿ› ๏ธ Technical Stack & Tools

Category Tools
Reconnaissance Nmap, Feroxbuster, Gobuster, WhatWeb, Wappalyzer
Exploitation Burp Suite, Netcat, Metasploit, Exploit-DB
Privilege Escalation LinPEAS, GTFOBins, Linux Smart Enumeration (LSE)
Scripting Python, Bash, PHP

๐Ÿ“– Methodology

Every write-up in this repository follows a standardized 4-step process to ensure clarity and technical depth:

  1. Reconnaissance: High-speed scanning and service fingerprinting.
  2. Foothold: Identification of entry-point vulnerabilities (CVEs, misconfigurations).
  3. Privilege Escalation: Internal enumeration to move from low-privilege users to Root/System.
  4. Remediation: Implementation of hardening measures and security patches.

๐Ÿš€ Featured Write-ups

Machine Platform Difficulty Key Vulnerabilities & Techniques
ChocolateLovers DockerLabs Easy CVE-2015-6967 (RCE), Sudoers Hijacking, Cronjob Exploitation
(Pending) ... ... ...

๐Ÿ‘ค About Me

I am a cybersecurity enthusiast focused on offensive security and system hardening. Currently developing my skills in web application security and Linux environments.


Disclaimer: All activities were performed in controlled, authorized environments for educational purposes only.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors