<aside> 🔖
Table of Contents
</aside>
Project Title: CTF Project | Technical Report on Flag Discovery and Exploitation in a Linux Environment
Platform: TryHackMe
Room: CTF Level One
Author: Athanasios Oikonomopoulos / B4ckD00rR4t
This Capture the Flag (CTF) project was completed as part of the Masterschool cybersecurity program to develop and demonstrate hands-on skills in system exploration, service enumeration, hash cracking, and privilege escalation. The challenge environment, hosted on TryHackMe, featured a vulnerable Linux machine with various misconfigurations and hidden flags.
Throughout the challenge, I:
*sudo*
rule on the target systemAll findings were documented step-by-step, showing the thought process behind each action, the tools used, and what each discovery revealed about the system's vulnerabilities.
This project validates my ability to conduct system reconnaissance, crack hashes, bypass weak configurations, and escalate privileges in a controlled CTF environment, skills directly transferable to red teaming, SOC analysis, or penetration testing roles.
Whether you’re a fellow learner, a cybersecurity enthusiast, or a hiring manager reviewing this as part of my portfolio, I invite you to follow along through this technical walkthrough. I hope it offers valuable insights, highlights my commitment to continuous growth, and provides a clear look at how I approach challenges in the evolving field of cybersecurity.
Tool | Purpose |
---|---|
Nmap | Performed network scanning, service enumeration, and port discovery. |
John the Ripper | Cracked password hashes and ZIP file passwords. |
zip2john | Converted password-protected ZIP files into hashes for cracking. |
Hashid | Identified hash algorithms (e.g., MD5, SHA-1, SHA-256) before cracking. |
CyberChef | Decoded base64-encoded strings to reveal embedded flag values. |
Web Browser + Developer Tools | Used to inspect HTML, source code, and hidden web paths. |
Linux Command-Line Tools | Used ls , find , mkdir , echo , cat , grep , etc. for enumeration and file operations. |