How we obtained a Javascript reverse shell by exploiting a vulnerability on a Node.js application during a security assessment.
Alternative solution to the expected race condition of a vulnerable Linux binary.
Breaking a cryptographically weak hash function to generate a valid password and bypass authentication of a FTP server.
How we managed to solve a Keygenme with Python and Z3 a high-performance theorem prover.
Write-ups for the four Hacking Week 2015 Network challenges with Wireshark and Python.
Write-ups for the four Hacking Week 2015 Forensic challenges with volatility and rekall.
Breaking a weak 1024-bit RSA key by recovering primes through the Fermat's factorization method.
Decryption of an ADFGVX ciphertext, breaking a transposition cipher used by German Army during World War I.
Reverse engineering of a client and a server binary communicating through a COM object.
Filter and decode USB mouse position data from a packet capture to recover the flag.
Translate the legacy method of programming using punch cards with a custom Python OCR.
Recover the flag by intercepting and recording the dynamic library calls of a Linux binary.
Recover deleted files from a Linux ext4 file system and decompress one with KGB Archiver.
How to decrypt a simple multiple base character encoding ciphertext with Python.
How to discover and manually decompress a git object file from a web accessible repository.
Brute-force the key of a weak AES encryption implementation and decrypt the message.
Visualize a hidden message inside an audio file through its frequency spectrum.
Exploitation of a vulnerable Challenge-Response-Authentication-Protocol Linux binary.
Steal the administrator cookie which contains the flag through a XSS vulnerability in jQuery.