ctf
HTB Write-up | FormulaX (user-only)
Write-up for FormulaX, a retired HTB Linux machine.
ctf
Write-up for FormulaX, a retired HTB Linux machine.
ctf
Write-up for Blazorized, a retired HTB Windows machine.
ctf
Write-up for iClean, a retired HTB Linux machine.
ctf
Write-up for Vessel, a retired HTB Linux machine.
wordpress
Write-up for Paper, a retired HTB Linux machine.
ctf
This month, I was responsible for putting together the ØxOPOSɆC monthly challenge. Even though the competition is done, if you want to try it out yourself the application is still available here. So, if you don't want spoilers, stop reading! Onto the solutions! The challenge consisted of a
crypto
Write-up for retired Oposec's October challenge
crypto
Write-up for retired HTB crypto challenge that involves Multi-tap code and Atbash Cipher.
sstv
1 . My Paste | 100 Oh no! I forgot where I left my paste. 🗑 Perhaps you can help me find it? The source code has a little hidden clue: <span class="challenge-desc"><br> Oh no! I forgot where I left my paste. 🗑 <p>
tap code
Knock Knock (100) 21 31 11 22 { 32 11 44 15 45 43 42 34 43 15 } If I had known about Tap Code (aka Knock Code) this would have been straightforward. I ended up getting the flag with some "leaps of logic". Basically, by knowing that the
web
Passive-Aggressive Flask (100) I can give you a flag, but you'll have to be nice. Remember to say it LOUD, so I can hear you. https://passiveaggressive.apl3b.com ~ curl https://passiveaggressive.apl3b.com <!DOCTYPE html> <html lang="en"> <head>
web-assembly
Banner source: https://medium.com/trainingcenter/webassembly-a-jornada-o-que-%C3%A9-wasm-75e3f0f03124 I'm been trying to get into Web Assembly for a while, so when I found this CTF write-up by Chiam YJ I decided to give it a try. The original Challenge <!DOCTYPE html> <html> <