
[{"id":1130,"link":"https:\/\/www.thegeekghost.com\/2022\/11\/03\/hackfest-beginner-ctf-2022\/","name":"hackfest-beginner-ctf-2022","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2022\/11\/hfctf.png","alt":""},"title":"Hackfest Beginner CTF 2022","author":{"name":"Marghost","link":"https:\/\/www.thegeekghost.com\/author\/marghost\/"},"date":"Nov 3, 2022","dateGMT":"2022-11-03 02:23:34","modifiedDate":"2023-06-29 17:36:20","modifiedDateGMT":"2023-06-29 17:36:20","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.thegeekghost.com\/tag\/2022\/' rel='post_tag'>2022<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/ctf\/' rel='post_tag'>ctf<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/hackfest\/' rel='post_tag'>hackfest<\/a>"},"readTime":{"min":1,"sec":17},"status":"publish","excerpt":""},{"id":945,"link":"https:\/\/www.thegeekghost.com\/2022\/02\/13\/installing-gentoo-on-vmware-workstation-16\/","name":"installing-gentoo-on-vmware-workstation-16","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2022\/02\/gentoo-512_30714.png","alt":""},"title":"Installing Gentoo on VMware workstation 16","author":{"name":"Marghost","link":"https:\/\/www.thegeekghost.com\/author\/marghost\/"},"date":"Feb 13, 2022","dateGMT":"2022-02-13 20:27:45","modifiedDate":"2023-06-29 17:36:22","modifiedDateGMT":"2023-06-29 17:36:22","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/linux\/\" rel=\"category tag\">Linux<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/linux\/\" rel=\"category tag\">Linux<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.thegeekghost.com\/tag\/gentoo\/' rel='post_tag'>gentoo<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/install\/' rel='post_tag'>install<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/linux\/' rel='post_tag'>linux<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/vmware\/' rel='post_tag'>vmware<\/a>"},"readTime":{"min":11,"sec":22},"status":"publish","excerpt":""},{"id":828,"link":"https:\/\/www.thegeekghost.com\/2022\/01\/27\/how-to-monitor-your-windows-machine-with-splunk\/","name":"how-to-monitor-your-windows-machine-with-splunk","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2022\/01\/splunklogo.jpg","alt":""},"title":"How-to monitor your windows machine with splunk","author":{"name":"Marghost","link":"https:\/\/www.thegeekghost.com\/author\/marghost\/"},"date":"Jan 27, 2022","dateGMT":"2022-01-27 02:28:19","modifiedDate":"2023-06-29 17:36:23","modifiedDateGMT":"2023-06-29 17:36:23","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.thegeekghost.com\/tag\/alert\/' rel='post_tag'>alert<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/query\/' rel='post_tag'>query<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/server\/' rel='post_tag'>server<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/splunk\/' rel='post_tag'>splunk<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/vps\/' rel='post_tag'>vps<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/windows\/' rel='post_tag'>windows<\/a>"},"readTime":{"min":7,"sec":56},"status":"publish","excerpt":""},{"id":333,"link":"https:\/\/www.thegeekghost.com\/2018\/04\/02\/way-to-find-clues-inside-a-ctf-box\/","name":"way-to-find-clues-inside-a-ctf-box","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2022\/01\/pixelatedpentest_logo.png","alt":""},"title":"Way to find clues inside a ctf box","author":{"name":"Marghost","link":"https:\/\/www.thegeekghost.com\/author\/marghost\/"},"date":"Apr 2, 2018","dateGMT":"2018-04-02 16:13:07","modifiedDate":"2023-06-29 17:53:28","modifiedDateGMT":"2023-06-29 17:53:28","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":19},"status":"publish","excerpt":""},{"id":309,"link":"https:\/\/www.thegeekghost.com\/2018\/03\/19\/wip-linux-pentest-cheatsheet\/","name":"wip-linux-pentest-cheatsheet","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2017\/09\/linux-penguin-blackboard.jpg","alt":""},"title":"WIP - Linux pentest cheatsheet","author":{"name":"Marghost","link":"https:\/\/www.thegeekghost.com\/author\/marghost\/"},"date":"Mar 19, 2018","dateGMT":"2018-03-19 15:47:57","modifiedDate":"2023-06-29 17:36:38","modifiedDateGMT":"2023-06-29 17:36:38","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/linux\/\" rel=\"category tag\">Linux<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tools\/\" rel=\"category tag\">Tools<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/linux\/\" rel=\"category tag\">Linux<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tools\/\" rel=\"category tag\">Tools<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.thegeekghost.com\/tag\/cheatsheet\/' rel='post_tag'>cheatsheet<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/linux\/' rel='post_tag'>linux<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/pentest\/' rel='post_tag'>pentest<\/a>"},"readTime":{"min":2,"sec":1},"status":"publish","excerpt":""},{"id":302,"link":"https:\/\/www.thegeekghost.com\/2017\/09\/01\/a-journey-into-windows-pentesting\/","name":"a-journey-into-windows-pentesting","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2017\/09\/hacking-windows-using-linux.jpg","alt":""},"title":"A journey into Windows pentesting.","author":{"name":"Marghost","link":"https:\/\/www.thegeekghost.com\/author\/marghost\/"},"date":"Sep 1, 2017","dateGMT":"2017-09-01 16:59:38","modifiedDate":"2023-06-29 17:36:40","modifiedDateGMT":"2023-06-29 17:36:40","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.thegeekghost.com\/tag\/metasploit\/' rel='post_tag'>metasploit<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/pentest\/' rel='post_tag'>pentest<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/root\/' rel='post_tag'>root<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/windows\/' rel='post_tag'>windows<\/a>"},"readTime":{"min":2,"sec":13},"status":"publish","excerpt":""},{"id":283,"link":"https:\/\/www.thegeekghost.com\/2017\/08\/23\/ctf-analougepond-from-knightmare2600-vulnhub\/","name":"ctf-analougepond-from-knightmare2600-vulnhub","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2022\/01\/pixelatedpentest_logo.png","alt":""},"title":"CTF Analougepond from @knightmare2600 (VulnHub)","author":{"name":"The Geek Ghost","link":"https:\/\/www.thegeekghost.com\/author\/t-g-g\/"},"date":"Aug 23, 2017","dateGMT":"2017-08-23 01:34:14","modifiedDate":"2023-06-29 17:52:37","modifiedDateGMT":"2023-06-29 17:52:37","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":53},"status":"publish","excerpt":""},{"id":270,"link":"https:\/\/www.thegeekghost.com\/2017\/03\/24\/ctf-ew_skuzzy-from-vortexau-vulnhub\/","name":"ctf-ew_skuzzy-from-vortexau-vulnhub","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2017\/03\/ew_skuzzy-02.png","alt":""},"title":"CTF Ew_Skuzzy from @vortexau (Vulnhub)","author":{"name":"The Geek Ghost","link":"https:\/\/www.thegeekghost.com\/author\/t-g-g\/"},"date":"Mar 24, 2017","dateGMT":"2017-03-24 04:51:17","modifiedDate":"2022-11-03 01:33:41","modifiedDateGMT":"2022-11-03 01:33:41","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":11,"sec":16},"status":"publish","excerpt":""},{"id":250,"link":"https:\/\/www.thegeekghost.com\/2017\/03\/22\/ctf-orcus-from-viper-hackfest-2016\/","name":"ctf-orcus-from-viper-hackfest-2016","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2017\/03\/orcus-01.png","alt":""},"title":"CTF Orcus from Viper (hackfest 2016)","author":{"name":"The Geek Ghost","link":"https:\/\/www.thegeekghost.com\/author\/t-g-g\/"},"date":"Mar 22, 2017","dateGMT":"2017-03-22 22:05:11","modifiedDate":"2022-01-04 05:18:59","modifiedDateGMT":"2022-01-04 05:18:59","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":15,"sec":15},"status":"publish","excerpt":""},{"id":220,"link":"https:\/\/www.thegeekghost.com\/2017\/03\/19\/ctf-sedna-from-viper-hackfest-2016\/","name":"ctf-sedna-from-viper-hackfest-2016","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2017\/03\/wp-1490109887357.jpg","alt":""},"title":"CTF Sedna from Viper (hackfest 2016)","author":{"name":"The Geek Ghost","link":"https:\/\/www.thegeekghost.com\/author\/t-g-g\/"},"date":"Mar 19, 2017","dateGMT":"2017-03-19 05:37:05","modifiedDate":"2022-01-04 05:18:59","modifiedDateGMT":"2022-01-04 05:18:59","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":7,"sec":58},"status":"publish","excerpt":""}]