Intro
Hi, in this post we will deal with Silky-CTF 0x02 from VulnHub. This VM is also similar to its predecessor, it includes enumeration, information gathering, reverseengineering, web exploitation and password cracking.
Hi, after the CTF I thought I'd do another one. The CTF I'm doing a WriteUp on now is Sikly CTF-1. I have deliberately chosen this CTF, because this is also a CTF-VM, which is also used in the OSCP in one of the labs.
Hi, I have bock to tinker a small file system. A filesystem is in the end, a tree. Normally a B-tree or a (B+)-tree is used to realize a filesystem. I thought why not make the whole thing OOP.
Hi, in the seventh and last part of my graph series, I want to talk about Dijkstra's algorithm. We have programmed Kruskal in Python in the sixth part. Now it's time to move on to Dijkstra.
Hi, in the fifth part of my graph series, I want to talk about the Prim algorithm. In the fourth part, we programmed the breadth-first search in Python.
Hi, in the sixth part of my graph series, I want to talk about the Kruskal algorithm. We have programmed Prim in Python in the fifth part. Now it's time for Kruskal.
The Observer pattern, is a design pattern from Object Oriented Programming. This pattern is intended to make things easier for us.
Hi, in the third part of my graph series, I want to talk about the search algorithms. We have programmed the graph in Python in the second part. Now it goes to the search algorithms. Each search algorithm will be discussed in separate posts.
Hi, in the fourth part of my graph series, I want to talk about breadth-first search. We have programmed the depth-first search in Python in the third part. Now we will go into the breadth-first search.
Hi, in the second part of the graph series, I want to go into how to build graphs programming-wise. The implementation is in Python and JSON (Javascript Object Notation).