CTF writeups My solutions for some Capture-The-Flag (CTF) pen-testing challenges. Notes: Flags or flag locations may be revealed in the writeups. IP address of attack VM is written as: AAA.AAA.AAA.AAA IP address of victim VM is written as: BBB.BBB.BBB.BBB