<aside> 🔖

Table of Contents

</aside>

Project Summary

Project Title: CTF Project | Technical Report on Flag Discovery and Exploitation in a Linux Environment

Platform: TryHackMe

Room: CTF Level One

Author: Athanasios Oikonomopoulos / B4ckD00rR4t

This Capture the Flag (CTF) project was completed as part of the Masterschool cybersecurity program to develop and demonstrate hands-on skills in system exploration, service enumeration, hash cracking, and privilege escalation. The challenge environment, hosted on TryHackMe, featured a vulnerable Linux machine with various misconfigurations and hidden flags.

Throughout the challenge, I:

All findings were documented step-by-step, showing the thought process behind each action, the tools used, and what each discovery revealed about the system's vulnerabilities.

This project validates my ability to conduct system reconnaissance, crack hashes, bypass weak configurations, and escalate privileges in a controlled CTF environment, skills directly transferable to red teaming, SOC analysis, or penetration testing roles.

Whether you’re a fellow learner, a cybersecurity enthusiast, or a hiring manager reviewing this as part of my portfolio, I invite you to follow along through this technical walkthrough. I hope it offers valuable insights, highlights my commitment to continuous growth, and provides a clear look at how I approach challenges in the evolving field of cybersecurity.

Tools I Used

Tool Purpose
Nmap Performed network scanning, service enumeration, and port discovery.
John the Ripper Cracked password hashes and ZIP file passwords.
zip2john Converted password-protected ZIP files into hashes for cracking.
Hashid Identified hash algorithms (e.g., MD5, SHA-1, SHA-256) before cracking.
CyberChef Decoded base64-encoded strings to reveal embedded flag values.
Web Browser + Developer Tools Used to inspect HTML, source code, and hidden web paths.
Linux Command-Line Tools Used ls, find, mkdir, echo, cat, grep, etc. for enumeration and file operations.