23 Beiträge gefunden
A comprehensive writeup of the first Neuland CTF held at Technische Hochschule Ingolstadt. This post covers all challenge solutions across multiple categories including cryptography, steganography, forensics, OSINT, web, and pwn.
A vulnerability in the THI-App allows attackers to intercept and modify network traffic, potentially exposing sensitive user data.
A detailed walkthrough of solving the Bamboozled challenge from Cyber Santa CTF. This write-up explains how to analyze Python bytecode to extract a flag when decompilers fail.
A comprehensive writeup for the 'Delivery' machine from HackTheBox. This guide walks through exploiting a Mattermost server to obtain user credentials and using database access to crack admin passwords.
A step-by-step guide to exploiting the 'Ready' machine from HackTheBox. This writeup covers escaping from a GitLab container and establishing persistence through container vulnerabilities.