WriteUps

Explorez mes analyses détaillées de challenges CTF et vulnérabilités

17 WriteUps
4 Catégories
4 CTFs
2025 Année

FCSC 2025 - xortp

Writeup: xortp Challenge Overview This challenge involves exploiting a buffer overflow vulnerability in the “xortp” binary to gain a shell and read the flag. The exploit leverages …

pwn buffer-overflow xor

Breizh CTF 2025 - Otis 10

Otis 10 - Breizh CTF 2025 Challenge Description Otis 10 is a Pwn challenge from Breizh CTF 2025. The binary simulates a transformation system between a cow and other creatures, and contains a classic …

use-after-free heap-exploitation

Breizh CTF 2025 - Metamorph

Metamorph - Breizh CTF 2025 Challenge Description Metamorph is a Pwn category challenge from Breizh CTF 2025. It is a binary that accepts a shellcode as input but imposes certain restrictions on the …

shellcode exploitation

Breizh CTF 2025 - JackPwn

JackPwn - Breizh CTF 2025 Challenge Description JackPwn is a Pwn category challenge from Breizh CTF 2025. It simulates a roulette game with a vulnerability. Binary Analysis Here is the source code of …

buffer-overflow exploitation

FCSC 2024 - Challenge de Reverse Engineering

Write-up: Challenge de Reverse Engineering Introduction Ce write-up présente la résolution d’un challenge de reverse engineering où nous devions analyser du code assembleur pour trouver un flag …

reverse-engineering assembly cryptography

Web Fuzzing - HTB Course WriteUp

Web Fuzzing Ce writeup couvre le cours Web Fuzzing sur HTB. Vue d’ensemble Le fuzzing web est une technique essentielle en pentesting qui consiste à tester systématiquement les entrées …

web fuzzing pentest htb

PwnMe Junior 2025 - overflowme WriteUp

PwnMe Junior 2025 - overflowme WriteUp Description du challenge Le challenge overflowme est un exercice de buffer overflow sur un binaire 64 bits. Le programme attend une entrée utilisateur et …

pwn buffer-overflow ctf pwnme

PwnMe Junior 2025 - Overflowme

Write-up: Overflowme - PwnMe Junior 2025 Description Overflowme est un challenge de type “buffer overflow” classique, parfait pour s’initier aux techniques d’exploitation …

buffer-overflow exploitation

PwnMe Junior 2025 - Evil-Hackers WriteUp

PwnMe Junior 2025 - Evil-Hackers WriteUp Description du challenge Le challenge Evil-Hackers est une épreuve de Use-After-Free (UAF) sur un binaire 64 bits. Le programme gère des connexions de hackers …

pwn use-after-free ctf pwnme

PwnMe Junior 2025 - Evil Hackers

Write-up: Evil Hackers - PwnMe Junior 2025 Description Evil Hackers est un challenge de type “use-after-free” (UAF) qui simule un système de gestion d’utilisateurs vulnérable. …

use-after-free exploitation

Pentesting SNMP - WriteUp rapide

Pentesting SNMP - WriteUp rapide Note : SNMP (Simple Network Management Protocol) est souvent négligé dans les tests de sécurité mais peut révéler des informations sensibles sur les systèmes. …

pentest network snmp

GDB and NASM Assembly Guide - WriteUp

GDB and NASM Assembly Guide This writeup provides a comprehensive guide to using GDB for debugging NASM assembly code, with practical examples and explanations. Instructions and Code for GDB and NASM …

assembly gdb nasm debugging reverse-engineering

Cyber Apocalypse 2024 - SealedRune

SealedRune - Cyber Apocalypse 2024 Challenge Description SealedRune is a reverse engineering challenge from Cyber Apocalypse CTF 2024. The program expects a specific input which, when entered …

binary-analysis decompilation

Cyber Apocalypse 2024 - ImpossibleMaze

ImpossibleMaze - Cyber Apocalypse Challenge Description ImpossibleMaze is a reverse engineering challenge from the Cyber Apocalypse CTF 2024. The program simulates a maze that seems impossible to …

binary-patching terminal-size

Cyber Apocalypse 2024 - EndlessCycle

EndlessCycle - Cyber Apocalypse Challenge Description EndlessCycle is a reverse engineering challenge from Cyber Apocalypse CTF 2024. The program appears to trap the user in an endless loop, but …

binary-analysis xor-decryption

Cyber Apocalypse 2024 - EncryptedScroll

EncryptedScroll - Cyber Apocalypse Challenge Description EncryptedScroll is a reverse engineering challenge from Cyber Apocalypse CTF 2024. The program simulates a magical scroll that only reveals its …

cyber apocalypse reverse character manipulation encryption