<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">

<channel>
    <title>Star-Lord's Blog</title>
    <link>https://starrylord.ch</link>
    <description>This is the place for sharing my activities, writeups, articles, check regularly for more!</description>
    <pubDate>Fri, 08 Jul 2022 15:25:00 GMT</pubDate>
    <lastBuildDate>Mon, 15 Dec 2025 21:08:08 GMT</lastBuildDate>
    <atom:link href="https://starrylord.ch/rss.xml" rel="self" type="application/rss+xml" />
    <item>
        <title>Nahamcon CTF 2023 - Web</title>
        <link>https://starrylord.ch/blog/nahamcon2023web</link>
        <description>This is what I managed to solve in the last 8 hours, when I could finally login.</description>
        <pubDate>Sun, 18 Jun 2023 00:00:00 GMT</pubDate>
        <guid>https://starrylord.ch/blog/nahamcon2023web</guid>
    </item>
    <item>
        <title>Reversing WordPress malware</title>
        <link>https://starrylord.ch/blog/reversing_wp_malware</link>
        <description>I did some incident response, OSINT, PHP and Javascript deobfuscating and reversing on a malware that was dropped at a friend's WordPress server. Read the full story of what happened here!</description>
        <pubDate>Mon, 22 May 2023 00:00:00 GMT</pubDate>
        <guid>https://starrylord.ch/blog/reversing_wp_malware</guid>
    </item>
    <item>
        <title>HTB Cyber Apocalypse CTF 2023</title>
        <link>https://starrylord.ch/blog/htb-cyberapocalypse-2023-bashic-ransomware</link>
        <description>This year I have managed to solve more challenges than ever before with TheWhiteCircle. But the forensics category, with the bashic ransomware challenge, actually made me want to share the write-up here!</description>
        <pubDate>Thu, 23 Mar 2023 00:00:00 GMT</pubDate>
        <guid>https://starrylord.ch/blog/htb-cyberapocalypse-2023-bashic-ransomware</guid>
    </item>
    <item>
        <title>My first job in IT</title>
        <link>https://starrylord.ch/blog/first-job</link>
        <description>A story of beginings, failure, and unconciously opening the door for the apt ⚡⚡⚡</description>
        <pubDate>Mon, 25 Jul 2022 00:00:00 GMT</pubDate>
        <guid>https://starrylord.ch/blog/first-job</guid>
    </item>
    <item>
        <title>My Journey</title>
        <link>https://starrylord.ch/</link>
        <description>Read a bit about my motivations, ethics, and beginings.</description>
        <pubDate>Sun, 10 Jul 2022 00:00:00 GMT</pubDate>
        <guid>https://starrylord.ch/</guid>
    </item>
    <item>
        <title>Privacy Policy</title>
        <link>https://starrylord.ch/privacy</link>
        <description>A detailed explanation of how I handle your data.</description>
        <pubDate>Sun, 10 Jul 2022 00:00:00 GMT</pubDate>
        <guid>https://starrylord.ch/privacy</guid>
    </item>
    <item>
        <title>Scam CTF 2022</title>
        <link>https://starrylord.ch/blog/scamctf2022</link>
        <description>This is the story of how I got scammed into participating in a CTF competition for someone else. I hope this article can help people not get scammed the same way or even help me find the competition I was unintentionally solving. I got contacted by a freshly created account on discord, 10 days old or so. The person first lightly asked for help in solving challenges,...</description>
        <pubDate>Sat, 30 Apr 2022 00:00:00 GMT</pubDate>
        <guid>https://starrylord.ch/blog/scamctf2022</guid>
    </item>
    <item>
        <title>Timing</title>
        <link>https://starrylord.ch/blog/hackthebox/timing</link>
        <description>LOCAL FILE INCLUSION LFI can be found here: http://10.10.11.135/image.php?img=/etc/passwd but we are met with "hacking attempt detected" on a blank page. We can bypass the issue with the php wrapper php://filter as follows: http://10.10.11.135/image.php?img=php://filter/convert.base64-encode/resource=/etc/passwd decode results as base64 and find home path for the user ...</description>
        <pubDate>Sat, 02 Apr 2022 00:00:00 GMT</pubDate>
        <guid>https://starrylord.ch/blog/hackthebox/timing</guid>
    </item>
    <item>
        <title>1337 up CTF</title>
        <link>https://starrylord.ch/blog/1337upctf</link>
        <description>Transforming time into flags… As an OSINT challenge I started by checking the username @0pt1muspr1me on common social media platforms, and eventually found 0pt1muspr1me's Github profile. 2 repos there with a couple commits 0pt1muspr1me repository private repository Obviously that zip file is password protected, so I started by trying fcrackzip:...</description>
        <pubDate>Tue, 29 Mar 2022 00:00:00 GMT</pubDate>
        <guid>https://starrylord.ch/blog/1337upctf</guid>
    </item>
    <item>
        <title>Intelligence</title>
        <link>https://starrylord.ch/blog/hackthebox/intelligence</link>
        <description>Medium difficulty box - https://hackthebox.com Intelligence was a medium box I solved a few months ago. It’s also technically the first machine I decided to share a write-up for, because I really enjoyed solving it. RECON nmap -A 10.10.10.248 -Pn...</description>
        <pubDate>Thu, 02 Sep 2021 00:00:00 GMT</pubDate>
        <guid>https://starrylord.ch/blog/hackthebox/intelligence</guid>
    </item></channel>

</rss>