A comprehensive writeup of the first Neuland CTF held at Technische Hochschule Ingolstadt. This post covers all challenge solutions across multiple categories including cryptography, steganography, forensics, OSINT, web, and pwn.
A vulnerability in the THI-App allows attackers to intercept and modify network traffic, potentially exposing sensitive user data.
A detailed walkthrough of solving the Bamboozled challenge from Cyber Santa CTF. This write-up explains how to analyze Python bytecode to extract a flag when decompilers fail.