Author: Michael Meade

  • NexHunt CTF 2025

    NexHunt CTF 2025

    If you want to read the write up from one of my other writeups from a CTF please see this link. Blank Challenge The challenge category is reverse and is worth 100 points. The snippet below shows information about the file. I used the file command to get this information. It shows that the file…

  • HeroCTF v7 2025

    HeroCTF v7 2025

    Please check out my other write up for a CTF named GlacierCTF. Tomcat Challenge The image above shows the file tree of the files that was given to us for this challenge. When visiting the site for this challenge, the page showed the default page for TomCat . I clicked one of the buttons to…

  • Taking a Look at Ruby Gems

    Taking a Look at Ruby Gems

    Origin Story. I decided to take some of my projects and publish the gems on Rubygems with my awesome username of Banksy. For those who do not know, gems are like Python’s packages. They make it easy to run code. To access the gem, simply add’ require “gem_name” ‘ to the top of the file,…

  • GlacierCTF 2025 Challenge

    GlacierCTF 2025 Challenge

    Please check out my other posted related to CTF, the name of the article is UTCFT 2025 CTF Challenge Write-Up. The GlacierCTF was hosted by  ISEC Institute @ TU Graz aka LosFuzzys. They did a great job hosting this CTF, there was no issues with the CTF. None of the challenges went down during the…

  • Danger of A.I

    Danger of A.I

    If you have not already, please check out last week’s article about “The dangers of downloading files“. Recently A. It has become popular and accessible to everyday folks. Before, you had to have a deep understanding of math and know how to program. And even have a large amount of commuting power. With Chat GPT,…

  • How to Safely Download Files

    How to Safely Download Files

    Check out this article about how to safety limit information about your kids on social media. Introduction Downloading files is necessary for tasks to be completed while on the computer. However, it is also the most dangerous, as it often opens the door for unknown software to access your computer. Your computer is not only…

  • A guide in achieving perfect Email security.

    A guide in achieving perfect Email security.

    Please check out my other blog post named “A guide on being safe on your phone.“ Nowadays, everyone has at least one email. Email security is really important; it is the gate to all your other accounts. Most sites require you to enter an email to sign up for the site. This makes emails a…

  • Back to School: Opsec!

    Back to School: Opsec!

    Please check out this post, keeping-your-phone-secure. What is even “Opsec”? Opsec, or operational security, aims to protect your personal and family information from being misused. Details from social media or other sources can be collected and used to target you in social engineering attacks or even help criminals plan crimes. First Day Back To School…

  • My first Trip to DefCon

    My first Trip to DefCon

    Intro I want to start this out that one of the items on my bucket list was to go to Defcon. While at Defcon the first day, we also went to Pawn Stars Pawn shop where I purchased a nice round. Sadly Chamblee’s candy store was closed. Also I guess it is common in Las…

  • Using PowerShell: At Work.

    Using PowerShell: At Work.

    Please check out my other post about PowerShell, which is titled “PowerShell Script to generate queries“. I had another post that showed the script, which could look up a domain’s IP and create a query for a specific product I use at my job. My boss gave us another script that we can use to…