Writeups by Solution
This document organizes CTF writeups by solution type and technique rather than by CTF event. Use this as a reference when looking for specific exploitation techniques or vulnerability types.
AI
- Jailbreak:
- KV cache:
Crypto
- RSA:
- Discrete logarithm:
- AES:
- DES:
- Double block cipher:
- Caesar cipher:
- Polynomial:
- Linear congruential generator
- ECDSA:
- Python random number generator
- C random number generator
- Approximate Common Divisor
- Modular Inverse Hidden Number Problem
- Differential Cryptanalysis
- Learning with Errors
Forensics
- Wireshark:
- Microsoft Word:
- Editor history:
- Disk image:
- Password protected files:
- Audio:
- Shell:
- Windows:
- NTUSER.DAT registry extraction using MiTeC Windows Registry Recovery
- C:\Windows\System32\winevt\Logs*.evtx files extraction using evtx_dump
- C:\Windows\System32\config* registry dump using reged or hivexregedit
- NTFS USN journal dump using USN-Journal-Parser
- Registry key modification time recovery via regipy
- Find recently accessed files via C:\Users\USERNAME\Recent*.lnk using lnkinfo or LECmd
- Find recently accessed files via C:\Users\USERNAME\Recent\AutomaticDestinations* using strings or JLECmd
- Find recently accessed files via RecentDocs in registry
- Find powershell execution history via C:\Users\USERNAME\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
- Find scheduled tasks under C:\ProgramData\Microsoft\Group Policy\History\GUID\Machine\Preferences\ScheduledTasks\ScheduledTasks.xml
- Linux:
- TightVNC:
Misc
- Image steganography:
- Text steganography:
- Audio steganography:
- Representations:
- Font:
- Side channel:
- PDF:
- DNS:
Pwn
- Stack buffer overflow:
- Format string:
- Out of bounds read/write:
- Arbitrary file access:
- Integer overflow:
- Ruby jail:
- JavaScript jail:
- Python jail:
- Shell jail:
- Perl jail:
- Environment variable:
- Seccomp jail:
Reverse
- Fuzzing:
- JavaScript:
- Android:
- Memory dump:
- Validation bypass:
- PyInstaller:
- BPF:
- Side channel:
Web
- XSS:
- GraphQL:
- CURL:
- PHP:
- Flask:
- SQL injection:
- Json query injection:
- MongoDB:
- Information leak:
- Next.js:
- YAML:
- Race condition:
- Path traversal:
- bcrypt:
- DNS:
- Side channel: