Overview
This is the standard format for Vexel writeups. Follow this structure when submitting your own.
Challenge / Target
Describe the challenge, vulnerability, or system under analysis. Include relevant context like the CTF event name, challenge category, and difficulty.
Reconnaissance
Detail the information gathering phase. What did you enumerate? What tools did you use? What caught your attention?
# example command
nmap -sV -sC target.htb
Exploitation
Step-by-step exploitation methodology. Be thorough — someone should be able to reproduce your work.
Flag / Impact
The result: flag captured, shell obtained, vulnerability impact assessed.
FLAG{example_flag_here}
Lessons Learned
Key takeaways, techniques worth remembering, and references for further reading.
Submitted by: your-handle | Event: event-name | Category: category