Intro
Hi, in this post we will deal with Silky-CTF 0x02 from VulnHub. This VM is also similar to its predecessor, it includes enumeration, information gathering, reverseengineering, web exploitation and password cracking.
Hi, after the CTF I thought I'd do another one. The CTF I'm doing a WriteUp on now is Sikly CTF-1. I have deliberately chosen this CTF, because this is also a CTF-VM, which is also used in the OSCP in one of the labs.