Skip to content

Commit c11d58e

Browse files
committed
add images
1 parent 4684f61 commit c11d58e

12 files changed

Lines changed: 20 additions & 20 deletions

website/_config.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ collections:
136136
output: true
137137
sort_by: order
138138
writeups:
139-
output: false
139+
output: true
140140

141141
defaults:
142142
- scope:

website/writeups/CyberConverge 2025/02-Big-machine.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ flag: CBCV{3nv1r0nm3nt_v4r14bl3s_c4n_b3_s3cr3t_2352}
1515

1616
Check the website on the given url
1717

18-
<img src="../images/big.png" />
18+
<img src="./images/big.png" />
1919

2020
It shows the pin result for given IPs.
2121
Try and get a reverse shell on it.
@@ -31,7 +31,7 @@ We can use python http.server to send the file. At the same time keep the netcat
3131

3232
After getting a reverse shell, try snoop around to find the flag. If you check the enviornment variables using `env` , you get the flag
3333

34-
<img src="../images/bigflag.png" />
34+
<img src="./images/bigflag.png" />
3535

3636

3737
### The flag found is:

website/writeups/CyberConverge 2025/04-Cathedral.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,11 @@ flag: CBCV{-8.9103\_-140.1026} OR CBCV{-8.9103\_-140.1030}
1414

1515
A quick Google Image Search reveals the location: Notre Dame Cathedral, Nuku Hiva, French Polynesia.
1616

17-
<img src="../images/catser.png" />
17+
<img src="./images/catser.png" />
1818

1919
From there, we head over to Google Earth (or Google Maps), locate the site, and switch to Street View. The exact coordinates can be extracted directly from the URL in the browser.
2020

21-
<img src="../images/catge.png" />
21+
<img src="./images/catge.png" />
2222

2323
### The flag found is:
2424
## CBCV{-8.9103\_-140.1026} OR CBCV{-8.9103\_-140.1030}

website/writeups/CyberConverge 2025/05-easy-file.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Just try and change the view?file=db_errors.log to common paths like ../app.py o
2020

2121
Visiting http://20.244.12.130:50002/view?file=../flag.txt give:
2222

23-
<img src="../images/easyhex.png" />
23+
<img src="./images/easyhex.png" />
2424

2525
A string of hex numbers: ` 57 56 57 50 7b 6a 34 6e 42 5f 6e 6c 34 70 33 6c 6d 34 46 5f 70 38 66 48 5f 39 33 39 38 35 31 7d `
2626

website/writeups/CyberConverge 2025/06-Hidden-Layers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,10 +28,10 @@ flag: CBCV{CRYPT_C4N_B3_L4Y3R5}
2828

2929
```python
3030
# Step 1: USE Morse decoder
31-
<img src="../images/morsedecoded1.png" />
31+
<img src="./images/morsedecoded1.png" />
3232

3333
# Step 2 & 3: Base32 decode and ROT13
34-
<img src="../images/from32baseandrot13.png" />
34+
<img src="./images/from32baseandrot13.png" />
3535

3636
# Step 4:Remove Alphabets from EVEN Postion
3737
ACBBCCDVE{FCGRHYIPJTK_LCM4NNO_PBQ3R_SLT4UYV3WRX5Y}Z

website/writeups/CyberConverge 2025/07-whoamii.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Decode it using tools like www.jwt.io
2121

2222
It give the flag as `"sub":"CBCV{jWt_t0k3ns_us3d_34}" `
2323

24-
<img src="../images/jwt1.png" />
24+
<img src="./images/jwt1.png" />
2525

2626

2727
### The flag found is:

website/writeups/CyberConverge 2025/08-i_am_who.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,15 +22,15 @@ This requires elevated privilages.
2222

2323
Use jwt.io to encode a cookie without any algorithm to bypass auth.
2424

25-
<img src="../images/iam.png" />
25+
<img src="./images/iam.png" />
2626

2727
This allows access to admin panel. But this isnt the end, we reqire another endpoint `finalcheck`
2828
And a new role called `superadmin` is needed.
2929
We can brute force common secret keys like `secret` or `qwerty` (in this case its `qwerty`).
3030

3131
Using jwt.io we craft a cookie and send it.
3232

33-
<img src="../images/iam2.png" />
33+
<img src="./images/iam2.png" />
3434

3535
Now we can access the /finalcheck endpoint and see the flag.
3636

website/writeups/CyberConverge 2025/10-itainthere.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ if pin == "98315":
7272
print("Bad pin!")
7373
```
7474
75-
<img src="../images/aint.png" />
75+
<img src="./images/aint.png" />
7676
7777
7878
### The flag found is:

website/writeups/CyberConverge 2025/12-locked.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ To try and fix the MD5 Check, we need to use hex editors like `hexedit`.
3636
We know 2 in hex is 32 and 0 in hex is 30.
3737
Replace these values with the hexeditor where there are 0s.
3838

39-
<img src="../images/locked.png" />
39+
<img src="./images/locked.png" />
4040

4141
Now run the file again. We get the flag
4242

website/writeups/CyberConverge 2025/16-mrrobot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ p.interactive()
7676
```
7777
7878
Running the script produces the output as the required flag.
79-
<img src="../images/mrobotflag.png" />
79+
<img src="./images/mrobotflag.png" />
8080
8181
8282
### The flag found is:

0 commit comments

Comments
 (0)