A comprehensive writeup of the first Neuland CTF held at Technische Hochschule Ingolstadt. This post covers all challenge solutions across multiple categories including cryptography, steganography, forensics, OSINT, web, and pwn.
A vulnerability in the THI-App allows attackers to intercept and modify network traffic, potentially exposing sensitive user data.