Aug. 13, 2023, 8:57 a.m. | Ahmet Talha Şen

System Weakness - Medium systemweakness.com

Solving File Inclusion CTF Challenges — A Step-by-Step Guide

Created by Lexica.art

Introduction

Capture The Flag (CTF) challenges are popular among cybersecurity enthusiasts, as they offer exciting opportunities to test and improve their skills in various security-related areas. In this article, we will explore different techniques to solve File Inclusion challenges from the “HTB” platform. We will walk through each step, explaining the thought process and actions taken to achieve the objectives.

File Inclusion Challenge 1: Finding a User’s Name …

ctf cybersecurity hackthebox hackthebox-walkthrough hackthebox-writeup

Network Security Analyst

@ Wiz | Tel Aviv

Penetration Testing Staff Engineer- Turkey Remote

@ SonicWall | Istanbul, Istanbul, Türkiye

Physical Security Engineer

@ Microsoft | Atlanta, Georgia, United States

Junior Security Consultant (m/w/d)

@ Deutsche Telekom | Berlin, Deutschland

Senior Cybersecurity Product Specialist - Security Endpoint Protection

@ Pacific Gas and Electric Company | San Ramon, CA, US, 94583

Security Engineer, Pre-Sales (PA/NJ)

@ Vectra | US - South New Jersey, US - Pennsylvania