CTF

Capture The Flag - Hacking Competitions

4
We learn how smart contracts written in solidity are deployed, and how it can be used to backdoor a contract.
I thought I know Ethereum smart contract security, but this challenge punched me in the face. This video goes over a basic first code review to understand the contract setup.
Video write-up about the Real World CTF challenge "flaglab" that involved exploiting a gitlab 1day. Actually two CVEs are combined to achieve full remote code execution.
In this video we identify a backdoor and find the gadgets to do Jump-oriented Programming in a ethereum smart contract.
This short php code contains a critical vulnerability. In this video I will explain in detail what I think while analysing it.
This challenge was an amazing team effort. The final stage was a bash eval injection, but without using any letters or numbers.
At first I was not able to solve the mindreader challenge, even though it was supposed to be easy. I have a critical look at my approach and figured out two major mistakes I made.
This was considered a hard challenge. After finding and analysing the source code we found a GQL injection. Unfortunately there is a system in place that will ban you for too many requests. So we use a modified binary search algorithm to finish in time.
Leaking data through a search cross origin, by abusing a behaviour of Chrome regarding iframed pages that trigger errors.
Hacking Competition in China. Our team qualified for the Real World CTF finals in China organised by Chaitin Tech, which was a really awesome CTF. In this video I want to share my experience and thoughts about the event.
This challenge was part of the FLARE-On 2018 CTF. In this video we reverse engineer a basic windows .exe to find out how to win the game. At first we tried to attack the weak crypto but failed. At the end it turns out I had a bug in my code :(

More CTF

Capture The Flag - Hacking Competitions