πŸ” cyberedueX LOGIN

πŸ“˜ Welcome to cyberedueX

πŸ”­ Your Cybersecurity Training Platform

Practice Windows CMD, PowerShell, and Linux commands in realistic environments. Solve challenges, earn points, and track your progress. Whether you're preparing for OSCP, eJPT, or just want to sharpen your CTF skills, cyberedueX provides hands-on terminal exercises and a collaborative learning experience.

πŸ“š Quick Stats

0 Modules done
0 Challenges solved
7 Day streak

πŸš€ Quick Actions

πŸ“ CMD
⚑ PowerShell
🐧 Linux
🎯 Challenges
πŸ“ˆ Performance Dashboard
0/50
CMD Modules
0%
0/50
PowerShell Modules
0%
0/50
Linux Modules
0%
0/24
Challenges Solved
0%

Recent Module Activity

πŸ“ CMD
⚑ PowerShell
🐧 Linux
🎯 Challenges
πŸ”„ Reset My Progress
πŸ‘€ My Profile
student
student
student@example.com
user
None
2026-02-17
0
0
CTF Challenges
All OS
Windows
Linux
All
Easy
Medium
Hard

πŸ‘₯ Teams

πŸ“ˆ Scoreboard

πŸ“„ Information

πŸ“š Command Reference

Select a Category

Choose a category to view commands.

πŸ” CTF Walkthrough: Basic File Discovery

Step 1: Understanding the Scenario

You're given access to a Windows machine where you suspect there's a hidden flag file. Your task is to navigate the file system and find this file using command-line tools.

Step 2: Basic Navigation with CMD

Open Command Prompt and start exploring the file system:

C:\Users\CTF-Player> dir
// Lists contents of current directory
Step 3: Searching for Files

Use search commands to find files that might contain the flag:

C:\> dir /s flag.txt
// Searches for flag.txt in all subdirectories
C:\> findstr /s "CTF{" *.txt
// Searches for text "CTF{" in all .txt files
Step 4: Using PowerShell for Advanced Search

PowerShell offers more advanced searching capabilities:

PS C:\> Get-ChildItem -Path C:\ -Recurse -Include *flag* -ErrorAction SilentlyContinue
// Recursively searches for files with "flag" in the name
PS C:\> Select-String -Path C:\Users\*.txt -Pattern "CTF{"
// Searches for the flag pattern in text files
Step 5: Examining File Contents

Once you find a potential flag file, examine its contents:

C:\Users\CTF-Player\Secret> type flag.txt
// Displays contents of flag.txt
PS C:\Users\CTF-Player\Secret> Get-Content flag.txt
// PowerShell equivalent to display file contents
βš™οΈ Admin Panel
UsernameEmailRoleModulesChallengesActions
TeamMembersCaptainJoin CodeActions
IDTitleCategoryPointsFlagsActions