Cybersecurity

23 Beiträge gefunden

Neuland CTF 2022 Winter - PWN
CTFWriteupCybersecurity
Neuland CTF 2022 Winter - Open Source Intelligence
CTFWriteupCybersecurity
Neuland CTF 2022 Winter - Miscellaneous
CTFWriteupCybersecurity
Neuland CTF 2022 Winter - Forensic
CTFWriteupCybersecurity
Neuland CTF 2022 Winter - Cryptography
CTFWriteupCybersecurity
Neuland CTF 2022 Spring

A comprehensive writeup of the first Neuland CTF held at Technische Hochschule Ingolstadt. This post covers all challenge solutions across multiple categories including cryptography, steganography, forensics, OSINT, web, and pwn.

CTFWriteupCybersecurity
THI-App Man in the Middle Vulnerability

A vulnerability in the THI-App allows attackers to intercept and modify network traffic, potentially exposing sensitive user data.

VulnerabilityTHICybersecurity
Cyber Santa CTF - Bamboozled Challenge Writeup

A detailed walkthrough of solving the Bamboozled challenge from Cyber Santa CTF. This write-up explains how to analyze Python bytecode to extract a flag when decompilers fail.

CTFWriteupCybersecurity
PicoCTF Web Exploitation Challenges
HacktheboxWriteupCybersecurity
HackTheBox 'Delivery' Writeup

A comprehensive writeup for the 'Delivery' machine from HackTheBox. This guide walks through exploiting a Mattermost server to obtain user credentials and using database access to crack admin passwords.

HacktheboxWriteupCybersecurity
HackTheBox 'Ready' Writeup

A step-by-step guide to exploiting the 'Ready' machine from HackTheBox. This writeup covers escaping from a GitLab container and establishing persistence through container vulnerabilities.

HacktheboxWriteupCybersecurity
© 2025 Neuland Ingolstadt e.V.
Build: 6217586