[{"id":1130,"link":"https:\/\/www.thegeekghost.com\/2022\/11\/03\/hackfest-beginner-ctf-2022\/","name":"hackfest-beginner-ctf-2022","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2022\/11\/hfctf.png","alt":""},"title":"Hackfest Beginner CTF 2022","postMeta":{"_last_editor_used_jetpack":["classic-editor"],"_edit_lock":["1667442324:3"],"_edit_last":["2"],"_thumbnail_id":["1118"],"_hide_featured":["1"],"boldgrid_hide_page_title":["0"],"boldgrid_in_page_containers":["1"],"bgseo_robots_index":["index"],"bgseo_robots_follow":["follow"]},"author":{"name":"Marghost","link":"https:\/\/www.thegeekghost.com\/author\/marghost\/"},"date":"Nov 3, 2022","dateGMT":"2022-11-03 02:23:34","modifiedDate":"2023-06-29 17:36:20","modifiedDateGMT":"2023-06-29 17:36:20","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.thegeekghost.com\/tag\/2022\/' rel='post_tag'>2022<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/ctf\/' rel='post_tag'>ctf<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/hackfest\/' rel='post_tag'>hackfest<\/a>"},"readTime":{"min":1,"sec":17},"status":"publish","excerpt":""},{"id":945,"link":"https:\/\/www.thegeekghost.com\/2022\/02\/13\/installing-gentoo-on-vmware-workstation-16\/","name":"installing-gentoo-on-vmware-workstation-16","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2022\/02\/gentoo-512_30714.png","alt":""},"title":"Installing Gentoo on VMware workstation 16","postMeta":{"_last_editor_used_jetpack":["classic-editor"],"_edit_lock":["1644784064:3"],"_edit_last":["2"],"_thumbnail_id":["946"],"_hide_featured":["1"],"boldgrid_hide_page_title":["0"],"boldgrid_in_page_containers":["1"],"bgseo_title":["Installing Gentoo on VMware workstation 16"],"bgseo_description":["Installing Gentoo linux inside a virtual machine with vmware workstation 16.  Compiling kernel, bootloader and installing a graphical desktop environment."],"bgseo_robots_index":["index"],"bgseo_robots_follow":["follow"],"bgseo_custom_keyword":["Installing Gentoo on VMware workstation 16"]},"author":{"name":"Marghost","link":"https:\/\/www.thegeekghost.com\/author\/marghost\/"},"date":"Feb 13, 2022","dateGMT":"2022-02-13 20:27:45","modifiedDate":"2023-06-29 17:36:22","modifiedDateGMT":"2023-06-29 17:36:22","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/linux\/\" rel=\"category tag\">Linux<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/linux\/\" rel=\"category tag\">Linux<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.thegeekghost.com\/tag\/gentoo\/' rel='post_tag'>gentoo<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/install\/' rel='post_tag'>install<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/linux\/' rel='post_tag'>linux<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/vmware\/' rel='post_tag'>vmware<\/a>"},"readTime":{"min":11,"sec":22},"status":"publish","excerpt":""},{"id":828,"link":"https:\/\/www.thegeekghost.com\/2022\/01\/27\/how-to-monitor-your-windows-machine-with-splunk\/","name":"how-to-monitor-your-windows-machine-with-splunk","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2022\/01\/splunklogo.jpg","alt":""},"title":"How-to monitor your windows machine with splunk","postMeta":{"_last_editor_used_jetpack":["classic-editor"],"_edit_lock":["1688008377:2"],"_edit_last":["2"],"_hide_featured":["1"],"boldgrid_hide_page_title":["0"],"boldgrid_in_page_containers":["1"],"bgseo_robots_index":["index"],"bgseo_robots_follow":["follow"],"bgseo_custom_keyword":["How-to monitor your windows machine with Splunk."],"_oembed_e2adaf0b0b8bc8d770ab34bf00b21526":["<blockquote class=\"wp-embedded-content\" data-secret=\"9h9sijKU44\"><a href=\"https:\/\/geek-university.com\/splunk\/collect-event-logs-from-a-local-windows-machine\/\">Collect event logs from a local Windows machine<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"“Collect event logs from a local Windows machine” — Geek University\" src=\"https:\/\/geek-university.com\/splunk\/collect-event-logs-from-a-local-windows-machine\/embed\/#?secret=xwcpfmFyF1#?secret=9h9sijKU44\" data-secret=\"9h9sijKU44\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>"],"_oembed_time_e2adaf0b0b8bc8d770ab34bf00b21526":["1643247021"],"_oembed_203c4b00be74f745af0c2d836951c3af":["<blockquote class=\"wp-embedded-content\" data-secret=\"PrIDcYGHVt\"><a href=\"https:\/\/geek-university.com\/splunk\/collect-event-logs-from-a-local-windows-machine\/\">Collect event logs from a local Windows machine<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"“Collect event logs from a local Windows machine” — Geek University\" src=\"https:\/\/geek-university.com\/splunk\/collect-event-logs-from-a-local-windows-machine\/embed\/#?secret=dSgx3ZNWZQ#?secret=PrIDcYGHVt\" data-secret=\"PrIDcYGHVt\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>"],"_oembed_time_203c4b00be74f745af0c2d836951c3af":["1643245471"],"_syntaxhighlighter_encoded":["1"],"_oembed_5d402353ded53449798455f1e80cb835":["{{unknown}}"],"bgseo_title":["How-to monitor your windows machine with splunk"],"bgseo_description":["Using splunk to monitor your computer or vps is free, easy and let you learn about one of the best SIEM tool available on the market (as for now 2022)."],"_thumbnail_id":["917"]},"author":{"name":"Marghost","link":"https:\/\/www.thegeekghost.com\/author\/marghost\/"},"date":"Jan 27, 2022","dateGMT":"2022-01-27 02:28:19","modifiedDate":"2023-06-29 17:36:23","modifiedDateGMT":"2023-06-29 17:36:23","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.thegeekghost.com\/tag\/alert\/' rel='post_tag'>alert<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/query\/' rel='post_tag'>query<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/server\/' rel='post_tag'>server<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/splunk\/' rel='post_tag'>splunk<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/vps\/' rel='post_tag'>vps<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/windows\/' rel='post_tag'>windows<\/a>"},"readTime":{"min":7,"sec":56},"status":"publish","excerpt":""},{"id":333,"link":"https:\/\/www.thegeekghost.com\/2018\/04\/02\/way-to-find-clues-inside-a-ctf-box\/","name":"way-to-find-clues-inside-a-ctf-box","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2022\/01\/pixelatedpentest_logo.png","alt":""},"title":"Way to find clues inside a ctf box","postMeta":{"_wpcom_is_markdown":["1"],"_edit_last":["2"],"timeline_notification":["1522685590"],"geo_public":["0"],"_publicize_job_id":["16388428296"],"_edit_lock":["1688061209:2"],"_last_editor_used_jetpack":["classic-editor"],"_thumbnail_id":["684"],"_hide_featured":["1"],"boldgrid_hide_page_title":["1"],"boldgrid_in_page_containers":["1"]},"author":{"name":"Marghost","link":"https:\/\/www.thegeekghost.com\/author\/marghost\/"},"date":"Apr 2, 2018","dateGMT":"2018-04-02 16:13:07","modifiedDate":"2023-06-29 17:53:28","modifiedDateGMT":"2023-06-29 17:53:28","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":19},"status":"publish","excerpt":""},{"id":309,"link":"https:\/\/www.thegeekghost.com\/2018\/03\/19\/wip-linux-pentest-cheatsheet\/","name":"wip-linux-pentest-cheatsheet","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2017\/09\/linux-penguin-blackboard.jpg","alt":""},"title":"WIP - Linux pentest cheatsheet","postMeta":{"_wpcom_is_markdown":["1"],"_edit_last":["2"],"geo_public":["0"],"_thumbnail_id":["311"],"_oembed_181316cdd5dcfe1360256e3cca4063ff":["{{unknown}}"],"_oembed_7dfe21ba88dc498d8c76a477fc9339c9":["{{unknown}}"],"_oembed_8a21dceae4a50dd609e7bd4089f56f00":["{{unknown}}"],"timeline_notification":["1521474481"],"_rest_api_published":["1"],"_rest_api_client_id":["2697"],"_publicize_job_id":["15887444909"],"_oembed_f8177b2e3e28749c02891722338fcf40":["{{unknown}}"],"_oembed_45c196fb784f0434e0e95308d713fb3c":["{{unknown}}"],"_oembed_cb77d2f1618db31035c6e260f7228207":["{{unknown}}"],"_oembed_110a9d2b2922cf6d03c064f547959b09":["{{unknown}}"],"_oembed_5efdfdd50445708a9ce9b9020ed73d44":["{{unknown}}"],"_oembed_02773859f5b179f92d238329dfb8b118":["{{unknown}}"],"_oembed_cde6241d453e27677bc39a531595ee46":["<blockquote class=\"wp-embedded-content\" data-secret=\"2tFnfD7iAr\"><a href=\"https:\/\/pentestmonkey.net\/cheat-sheet\/shells\/reverse-shell-cheat-sheet\">Reverse Shell Cheat Sheet<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"“Reverse Shell Cheat Sheet” — pentestmonkey\" src=\"https:\/\/pentestmonkey.net\/cheat-sheet\/shells\/reverse-shell-cheat-sheet\/embed#?secret=2tFnfD7iAr\" data-secret=\"2tFnfD7iAr\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>"],"_oembed_time_cde6241d453e27677bc39a531595ee46":["1641371249"]},"author":{"name":"Marghost","link":"https:\/\/www.thegeekghost.com\/author\/marghost\/"},"date":"Mar 19, 2018","dateGMT":"2018-03-19 15:47:57","modifiedDate":"2023-06-29 17:36:38","modifiedDateGMT":"2023-06-29 17:36:38","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/linux\/\" rel=\"category tag\">Linux<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tools\/\" rel=\"category tag\">Tools<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/linux\/\" rel=\"category tag\">Linux<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tools\/\" rel=\"category tag\">Tools<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.thegeekghost.com\/tag\/cheatsheet\/' rel='post_tag'>cheatsheet<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/linux\/' rel='post_tag'>linux<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/pentest\/' rel='post_tag'>pentest<\/a>"},"readTime":{"min":2,"sec":1},"status":"publish","excerpt":""},{"id":302,"link":"https:\/\/www.thegeekghost.com\/2017\/09\/01\/a-journey-into-windows-pentesting\/","name":"a-journey-into-windows-pentesting","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2017\/09\/hacking-windows-using-linux.jpg","alt":""},"title":"A journey into Windows pentesting.","postMeta":{"_wpcom_is_markdown":["1"],"_edit_last":["2"],"geo_public":["0"],"_publicize_job_id":["8857598910"],"_thumbnail_id":["305"],"_oembed_254ec21db4b37ec1baf6c29a2f84246f":["{{unknown}}"],"_oembed_5ee44aaffa33003648e1d97e4ff2cd2d":["{{unknown}}"],"_oembed_bdb5a5940fd0ab180939a537a47fc764":["{{unknown}}"],"_oembed_1104e6e6f31b8624ff322c0f6fb43f9d":["{{unknown}}"],"_oembed_133890f7ee27f5df6b2335365f2544dd":["{{unknown}}"],"_oembed_be1adb3ea230c15e3b88a9708e8054d7":["{{unknown}}"],"_oembed_8c6a5ca2c3a02495bcba4f95c1b3aef9":["{{unknown}}"],"_oembed_24718bad484678f0be51f480568b687a":["{{unknown}}"],"_oembed_4e9af5ecdbbd90265f8ff7bafa94b7e4":["{{unknown}}"],"_oembed_76625761167d851c6151cd7ed5052e93":["{{unknown}}"],"_oembed_bef6564ce2ce2061ade9c847769b31c8":["{{unknown}}"],"_oembed_ce148aad8ee8f36760827dd1949a9ce1":["{{unknown}}"],"_oembed_254ac86eb8e7cf7a167cede9e7929126":["{{unknown}}"],"_oembed_2697a8ff4fca4eed743862affcd61c6e":["<a href=\"https:\/\/cyberarms.wordpress.com\/2015\/11\/05\/easy-remote-shells-with-web-delivery\/\">Easy Remote Shells with Web Delivery<\/a>"],"_oembed_time_2697a8ff4fca4eed743862affcd61c6e":["1594604976"],"_oembed_c13012763cc44761ac98a8efe4aa5175":["{{unknown}}"],"_oembed_9c75c7e0e63ed8b908b239df5e7c3779":["{{unknown}}"],"_oembed_43f4b4c1e0c183c4b2b4fb88dd917739":["<a href=\"https:\/\/cyberarms.wordpress.com\/2015\/11\/05\/easy-remote-shells-with-web-delivery\/\">Easy Remote Shells with Web Delivery<\/a>"],"_oembed_time_43f4b4c1e0c183c4b2b4fb88dd917739":["1594775584"],"_oembed_b755c5f68aada483d5ef68e68a80ce0c":["{{unknown}}"],"_oembed_8084b3aa6419b23a99a24303953d6ff9":["{{unknown}}"],"_oembed_d94a78c1a993490b5467946c3001aa1c":["<a href=\"https:\/\/cyberarms.wordpress.com\/2015\/11\/05\/easy-remote-shells-with-web-delivery\/\">Easy Remote Shells with Web Delivery<\/a>"],"_oembed_time_d94a78c1a993490b5467946c3001aa1c":["1595535920"],"_oembed_caa287493f3a26ba3a1d7869317edf32":["{{unknown}}"],"_oembed_b1584bb1c4b38169567c26110493b9b4":["{{unknown}}"],"_oembed_1c3e865849d129dfa68dca2c559ab185":["<a href=\"https:\/\/cyberarms.wordpress.com\/2015\/11\/05\/easy-remote-shells-with-web-delivery\/\">Easy Remote Shells with Web Delivery<\/a>"],"_oembed_time_1c3e865849d129dfa68dca2c559ab185":["1595583694"],"_oembed_c40c8e5e8f2d005eb076f3f006cf9035":["{{unknown}}"],"_oembed_f451fcd075b02fe1338a9fbf0217f554":["{{unknown}}"],"_oembed_087d06118ef9136f3bdbd8e6a4d84d18":["<a href=\"https:\/\/cyberarms.wordpress.com\/2015\/11\/05\/easy-remote-shells-with-web-delivery\/\">Easy Remote Shells with Web Delivery<\/a>"],"_oembed_time_087d06118ef9136f3bdbd8e6a4d84d18":["1595706818"],"_oembed_15e0041b25c0ab13c8e881f0d9052bbd":["{{unknown}}"],"_oembed_5b0407a88af4ccb6d18726f371a8c772":["{{unknown}}"],"_oembed_74c1c56bf2b2ffc0472326dcc7d9a5cd":["<a href=\"https:\/\/cyberarms.wordpress.com\/2015\/11\/05\/easy-remote-shells-with-web-delivery\/\">Easy Remote Shells with Web Delivery<\/a>"],"_oembed_time_74c1c56bf2b2ffc0472326dcc7d9a5cd":["1641263200"],"_oembed_b0fd829e8d091b29df72765683df15b6":["{{unknown}}"]},"author":{"name":"Marghost","link":"https:\/\/www.thegeekghost.com\/author\/marghost\/"},"date":"Sep 1, 2017","dateGMT":"2017-09-01 16:59:38","modifiedDate":"2023-06-29 17:36:40","modifiedDateGMT":"2023-06-29 17:36:40","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/tutorials\/\" rel=\"category tag\">Tutorials<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.thegeekghost.com\/tag\/metasploit\/' rel='post_tag'>metasploit<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/pentest\/' rel='post_tag'>pentest<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/root\/' rel='post_tag'>root<\/a><a href='https:\/\/www.thegeekghost.com\/tag\/windows\/' rel='post_tag'>windows<\/a>"},"readTime":{"min":2,"sec":13},"status":"publish","excerpt":""},{"id":283,"link":"https:\/\/www.thegeekghost.com\/2017\/08\/23\/ctf-analougepond-from-knightmare2600-vulnhub\/","name":"ctf-analougepond-from-knightmare2600-vulnhub","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2022\/01\/pixelatedpentest_logo.png","alt":""},"title":"CTF Analougepond from @knightmare2600 (VulnHub)","postMeta":{"_wpcom_is_markdown":["1"],"_oembed_fb0ede07bbf171c6a341b8fcc544aabd":["{{unknown}}"],"_oembed_7df0b4f583d7414779c96deaef335e79":["{{unknown}}"],"_edit_last":["2"],"geo_public":["0"],"_oembed_47def612e4f765fa8f9781be2557acd8":["{{unknown}}"],"_publicize_job_id":["8537245037"],"_oembed_2802555c29f6cca9e476683673bc208d":["{{unknown}}"],"_oembed_af9ddb0fcf336f5ce98d289d6a24ad40":["{{unknown}}"],"_oembed_03e629f6cfe553b3ee7b6b90871c3323":["{{unknown}}"],"_oembed_8e88478a1183f3a362a2bda8df8a3a59":["{{unknown}}"],"_oembed_d9a7a1be20c81d4ed3c3dee2c3df2631":["{{unknown}}"],"_oembed_398335e59e9b5358cc3e3a0e33f3c468":["{{unknown}}"],"_oembed_1bba4fd6b7765540de824124a19d91e6":["{{unknown}}"],"_oembed_fe0927127f443d79765a25775e5c4693":["{{unknown}}"],"_oembed_e440296ccca5e18f7ea34aacb6d453f2":["{{unknown}}"],"_oembed_2bb645d7568f3630b2a7632c88c5774a":["{{unknown}}"],"_oembed_91f9435e48c0a72be2dfa7bf95d6bf25":["{{unknown}}"],"_oembed_074c4e7ae64dd4963040698281998e48":["{{unknown}}"],"_oembed_68c041d18a42169643747b0e41475b48":["{{unknown}}"],"_oembed_d663d47d0a7e138df344dfac8ead5308":["{{unknown}}"],"_oembed_ebfa8bc6dcb091ab0d4fc4a7d2432884":["{{unknown}}"],"_oembed_243b632fb19c05ec4b54f9bd272929b1":["{{unknown}}"],"_oembed_34c0677d8d1753f9431e1928b88c9e41":["{{unknown}}"],"_oembed_f986d75a28842cf401ede31dd2336000":["{{unknown}}"],"_oembed_de23da8ad9d6ae3ec3d990db40552af6":["{{unknown}}"],"_oembed_55bda6ebaa363f7815a770e4fe4e3dc4":["{{unknown}}"],"_oembed_04a9e6db3e7603f0ebeb74539c63bc8d":["{{unknown}}"],"_oembed_ed9ba8fd7fbf5e36978d2a22f2521c2c":["{{unknown}}"],"_oembed_19ca0150ba275a3bbb70c347fffefe87":["{{unknown}}"],"_oembed_2991945f9c5b4830581f43b3e1a3b26d":["{{unknown}}"],"_oembed_57389249c3aa9640382ff5082f60f92d":["{{unknown}}"],"_oembed_d9e4f7fd7154de1b5c82606d58f7c43a":["{{unknown}}"],"_oembed_d924d7f9a9ff102c4cf3d9e33aec984a":["{{unknown}}"],"_edit_lock":["1688061160:2"],"_thumbnail_id":["684"],"_hide_featured":["1"],"boldgrid_hide_page_title":["1"],"boldgrid_in_page_containers":["1"]},"author":{"name":"The Geek Ghost","link":"https:\/\/www.thegeekghost.com\/author\/t-g-g\/"},"date":"Aug 23, 2017","dateGMT":"2017-08-23 01:34:14","modifiedDate":"2023-06-29 17:52:37","modifiedDateGMT":"2023-06-29 17:52:37","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":53},"status":"publish","excerpt":""},{"id":270,"link":"https:\/\/www.thegeekghost.com\/2017\/03\/24\/ctf-ew_skuzzy-from-vortexau-vulnhub\/","name":"ctf-ew_skuzzy-from-vortexau-vulnhub","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2017\/03\/ew_skuzzy-02.png","alt":""},"title":"CTF Ew_Skuzzy from @vortexau (Vulnhub)","postMeta":{"_wpcom_is_markdown":["1"],"_edit_last":["3"],"_thumbnail_id":["271"],"geo_public":["0"],"_publicize_job_id":["3211685396"],"_edit_lock":["1667439095:3"],"_last_editor_used_jetpack":["classic-editor"],"_hide_featured":[null],"boldgrid_hide_page_title":["1"],"_syntaxhighlighter_encoded":["1"],"boldgrid_in_page_containers":["1"],"bgseo_robots_index":["index"],"bgseo_robots_follow":["follow"]},"author":{"name":"The Geek Ghost","link":"https:\/\/www.thegeekghost.com\/author\/t-g-g\/"},"date":"Mar 24, 2017","dateGMT":"2017-03-24 04:51:17","modifiedDate":"2022-11-03 01:33:41","modifiedDateGMT":"2022-11-03 01:33:41","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":11,"sec":16},"status":"publish","excerpt":""},{"id":250,"link":"https:\/\/www.thegeekghost.com\/2017\/03\/22\/ctf-orcus-from-viper-hackfest-2016\/","name":"ctf-orcus-from-viper-hackfest-2016","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2017\/03\/orcus-01.png","alt":""},"title":"CTF Orcus from Viper (hackfest 2016)","postMeta":{"_wpcom_is_markdown":["1"],"_edit_last":["1"],"_thumbnail_id":["251"],"geo_public":["0"],"_publicize_job_id":["3163520609"]},"author":{"name":"The Geek Ghost","link":"https:\/\/www.thegeekghost.com\/author\/t-g-g\/"},"date":"Mar 22, 2017","dateGMT":"2017-03-22 22:05:11","modifiedDate":"2022-01-04 05:18:59","modifiedDateGMT":"2022-01-04 05:18:59","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":15,"sec":15},"status":"publish","excerpt":""},{"id":220,"link":"https:\/\/www.thegeekghost.com\/2017\/03\/19\/ctf-sedna-from-viper-hackfest-2016\/","name":"ctf-sedna-from-viper-hackfest-2016","thumbnail":{"url":"https:\/\/www.thegeekghost.com\/wp-content\/uploads\/2017\/03\/wp-1490109887357.jpg","alt":""},"title":"CTF Sedna from Viper (hackfest 2016)","postMeta":{"_wpcom_is_markdown":["1"],"_edit_last":["1"],"geo_public":["0"],"_publicize_job_id":["3025864142"],"_oembed_47def612e4f765fa8f9781be2557acd8":["{{unknown}}"],"_oembed_d9a7a1be20c81d4ed3c3dee2c3df2631":["{{unknown}}"],"_oembed_fe0927127f443d79765a25775e5c4693":["{{unknown}}"],"_thumbnail_id":["243"],"_oembed_91f9435e48c0a72be2dfa7bf95d6bf25":["{{unknown}}"],"_oembed_d663d47d0a7e138df344dfac8ead5308":["{{unknown}}"],"_oembed_34c0677d8d1753f9431e1928b88c9e41":["{{unknown}}"],"_oembed_55bda6ebaa363f7815a770e4fe4e3dc4":["{{unknown}}"],"_oembed_19ca0150ba275a3bbb70c347fffefe87":["{{unknown}}"],"_oembed_d9e4f7fd7154de1b5c82606d58f7c43a":["{{unknown}}"]},"author":{"name":"The Geek Ghost","link":"https:\/\/www.thegeekghost.com\/author\/t-g-g\/"},"date":"Mar 19, 2017","dateGMT":"2017-03-19 05:37:05","modifiedDate":"2022-01-04 05:18:59","modifiedDateGMT":"2022-01-04 05:18:59","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>","space":"<a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a> <a href=\"https:\/\/www.thegeekghost.com\/category\/cybersecurity\/writeups\/\" rel=\"category tag\">Writeups<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":7,"sec":58},"status":"publish","excerpt":""}]