HTB Cyber Apocalypse - Total: 44
CTF
Percetron
HTB CA 2024. HA-Proxy. HTTP request smuggling. Server-Side Request Forgery. MongoDB Wire Protocol. Gopher Protocol. Cypher injection (neo4j). Command injection. RCE
CTF
Testimonial
HTB CA 2024. Go. gRPC. Client-side verification. Directory traversal. Arbitrary File Write. Server-Side Rendering
CTF
Gloater
HTB CA 2024. 64-bit binary. Heap exploitation. House of Spirit. Overlapping chunks. Tcache poisoning. TLS-storage
dtor_list
CTF
Math Door
HTB CA 2023. 64-bit binary. Heap exploitation. Heap feng shui. Tcache poisoning.
FILE
structure attackCTF
Pandora's Bane
HTB CA 2023. Memory dump analysis. Rust reversing. PowerShell logs. C# .NET decompilation. XOR cipher
CTF
Interstellar C2
HTB CA 2023. Network traffic analysis. PowerShell deobfuscation. C# .NET decompilation. Steganography. AES cipher
CTF
Bashic Ransomware
HTB CA 2023. Network traffic analysis. Bash deobfuscation. Finding cryptographic keys. AES cipher
CTF
Relic Maps
HTB CA 2023. Malware analysis. Batch and PowerShell deobfuscation. AES cipher. C# .NET decompilation
CTF
Artifacts of Dangerous Sightings
HTB CA 2023. Disk image. Alternate Data Streams. PowerShell deobfuscation
CTF
Converging Visions
HTB CA 2023. ECC. Binary search. Finding curve parameters. Smart’s attack. PRNG
CTF
Elliptic Labyrinth Revenge
HTB CA 2023. ECC. Finding curve parameters. Coppersmith method on a bivariate polynomial