writeup
2024 Cyber Apocalypse: Writing on the Wall
Exploit off-by-one vulnerability and strcmp null byte behavior
#htb
#ctf
#pwn
+3 writeup
2023 Business CTF: Hackback
Exploit a Command and Control (C2) service by exploiting vulnerabilities in its bot management system.
#htb
#ctf
#pwn
+4 writeup
2023 Business CTF: Snow Scan
Bypass a bitmap scanning application by crafting a malicious BMP file to trigger code execution.
#htb
#ctf
#pwn
+4 writeup
2023 Cyber Apocalypse: Questionnaire
Buffer overflow via fgets() vulnerability in vulnerable C binary
#htb
#ctf
#pwn
+3 writeup
2023 Cyber Apocalypse: Getting Started
Buffer overflow exploitation using controlled payload delivery
#htb
#ctf
#pwn
+3