Highlighted writeups

DHCPPP
CTF

DHCPPP

ChaCha20-Poly1305. Nonce reuse. DNS
RRSSAA
CTF

RRSSAA

ECSC 2023. Third day. Multi-prime RSA. PRNG seed. RSA-CRT decryption
Zombie Rolled
CTF

Zombie Rolled

Fractions. Diophantine equation solution with elliptic curve. RSA signature. LLL lattice reduction. Groebner basis
Kernel searcher
CTF

Kernel searcher

ECSC 2023. Third day. Isogeny. Finding curve parameters. Discrete logarithm
Blessed
CTF

Blessed

BLS12-381. BLS signatures. Rogue key attack. Zero-knowledge proof. EC-LCG. LLL lattice reduction
FileStorage
CTF

FileStorage

64-bit binary. Buffer Overflow. Format String vulnerability. FILE structure attack. GOT overwrite
More

Recent CTF

oboe
CTF

oboe

DiceCTF 2025 Quals. Kernel exploitation. Heap exploitation. Off-by-one. Use After Free. ROP
Verilicious
CTF

Verilicious

HTB CA 2025. Padding oracle on RSA PKCS #1 v1.5. Bleichenbacher’s attack. Hidden Number Problem. LLL lattice reduction
Copperbox
CTF

Copperbox

HTB CA 2025. Truncated LCG. Coppersmith method on a bivariate polynomial
Spooky License
CTF

Spooky License

z3 solver
Mind In The Clouds
CTF

Mind In The Clouds

ECDSA. Partially-known nonces. LLL lattice reduction
More CTF

Recent HTB

Alert
HTB

Alert

Hack The Box. Linux. Easy machine. This machine allows to render Markdown files and share them with a unique link. The Markdown viewer is vulnerable to XSS, and we can send a link to the administrator to perform CSRF and read a confidential webpage. Besides, we find a Local File Read vulnerability, and we can find an .htpasswd file with a hashed password to access another subdomain. Instead, we can crack the hash and reuse the password for SSH. At this point, there is a local PHP server running as root, and we are able to manage PHP scripts, so we can simply execute PHP code as root
Bizness
HTB

Bizness

Hack The Box. Linux. Easy machine. This machine has a vulnerable version of Apache OFBiz that can be exploited to get RCE using an authentication bypass and Java deserialization payload. Once on the machine, we can inspect the database and search for the password hash of the administrator user. Once the hash is cracked, we can reuse the password and gain access as root
RegistryTwo
HTB

RegistryTwo

Hack The Box. Linux. Insane machine. This machine exposes a web application that allows to create custom domains with HTML code. Moreover, there is a Docker registry exposed where we can download Docker image blobs after getting a suitable JWT token. The web application is running a WAR file with Tomcat, we can decompile it and see that it queries a RMI server. Since Tomcat is behind an nginx reverse proxy, we can access some sensitive Tomcat servlets to modify our session and set manager permissions on the web application. We need this to modify the RMI configuration using a mass assignment vulnerability and point the RMI server to us. After that, we can exploit an insecure deserialization vulnerability in Java to get RCE in a container. Then, we can interact with the legitimate RMI server using port forwarding. This server allows us to read arbitrary files with a directory traversal attack. We can find a plaintext password for user developer, which is reused in SSH. Then, root is executing a JAR file to analyze files of the hosting website by sending them to a ClamAV server. The problem here is that the JAR calls functions from the RMI register, which is restarted periodically. Therefore, we can craft a malicious RMI registry and exploit win a race condition to take the port, so that root queries our malicious registry and talks to our fake ClamAV server. The result is that all files at /root will be quarantined inside a readable directory, which leads to the privilege escalation
Sau
HTB

Sau

Hack The Box. Linux. Easy machine. This machine has a web application that is vulnerable to SSRF, which can be used to read the contents of an internal server, which is vulnerable to command injection. The two vulnerabilities can be chained to get RCE on the machine. The low-privileged user is able to run systemctl as root using sudo, which leads to the privilege escalation via the default pager less
Pilgrimage
HTB

Pilgrimage

Hack The Box. Linux. Easy machine. This machine has a website that exposes a Git repository. We are able to extract the PHP source of the web application and find out that it uses ImageMagick under the hood to process uploaded images. The version of ImageMagick has a local file read vulnerability that can be used to read a SQLite database file and find a plaintext password for emily, which is used in SSH too. After that, we find that root executes a Bash script that uses binwalk to remove malware from uploaded image files. The version of binwalk is vulnerable to Remote Code Execution, which leads to the privilege escalation
More HTB

Recent IMC

IMC

IMC 2021, Problem 1

Let be a real matrix such that .
  1. Prove that there is a unique real matrix that satisfies the equation
  2. Express in terms of .
IMC

IMC 2020, Problem 2

Let and be real matrices such that where is the identity matrix. Prove that
IMC

IMC 2019, Problem 7

Let be the set of composite positive integers. For each , let be the smallest positive integer such that is divisible by . Determine whether the following series converges:
IMC

IMC 2019, Problem 5

Determine whether there exist an odd positive integer and matrices y with integer entries, that satisfy the following conditions:
  1. .
  2. .
  3. .
More IMC