<- OTHER CTFHTB Cyber Apocalypse - Total:
45

CTFHTB CA 2025. Truncated LCG. Coppersmith method on a bivariate polynomial 
CTFHTB CA 2024. HA-Proxy. HTTP request smuggling. Server-Side Request Forgery. MongoDB Wire Protocol. Gopher Protocol. Cypher injection (neo4j). Command injection. RCE 
CTFHTB CA 2024. Go. gRPC. Client-side verification. Directory traversal. Arbitrary File Write. Server-Side Rendering 
CTFHTB CA 2024. 64-bit binary. Heap exploitation. House of Spirit. Overlapping chunks. Tcache poisoning. TLS-storage dtor_list

CTFHTB CA 2024. 64-bit binary. Heap exploitation. Buffer Overflow. ROP 
CTFHTB CA 2024. 32-bit binary. Buffer Overflow. vDSO ROP. sys_execve

CTFHTB CA 2024. 64-bit binary. Glibc 2.35. Buffer Overflow. ROP 
CTFHTB CA 2024. Path-finding. Breadth-first Search. Dijkstra’s algorithm 
CTFHTB CA 2024. TEA. Equivalent keys. CBC mode 
CTFHTB CA 2024. ECC. Finding curve parameters. Modular arithmetic. ECDLP 
CTFHTB CA 2024. RSA. Partially-known private information. Modular arithmetic 
CTFHTB CA 2024. TEA. Reverse encryption function 
CTFHTB CA 2024. Integer Overflow 
CTFHTB CA 2024. Block hash 
CTFHTB CA 2023. Insecure Deserialization in pickle
. SSRF in Redis 
CTFHTB CA 2023. Malicious file upload. SSTI to XSS. CSP bypass 
CTFHTB CA 2023. JWT. Server-Side Template Injection 
CTFHTB CA 2023. SQL injection. Directory Traversal. Local File Read 
CTFHTB CA 2023. GraphQL. IDOR 
CTFHTB CA 2023. Virtual machine. Custom opcode instructions. sys_ptrace
. XOR cipher 
CTFHTB CA 2023. 64-bit binary. Heap exploitation. Heap feng shui. Tcache poisoning. FILE
structure attack 
CTFHTB CA 2023. 64-bit binary. OOB. GOT overwrite 
CTFHTB CA 2023. 64-bit binary. Buffer Overflow. ret2dlresolve 
CTFHTB CA 2023. 64-bit binary. Buffer Overflow. ret2libc 
CTFHTB CA 2023. 64-bit binary. Buffer Overflow. Redirecting program execution 
CTFHTB CA 2023. Binary search. Euclidean distance 
CTFHTB CA 2023. Python jail 
CTFHTB CA 2023. PRNG with time-based seed. strstr
bug 
CTFHTB CA 2023. Restricted Bash escape 
CTFHTB CA 2023. YAML deserialization attack 
CTFHTB CA 2023. Noisy channel. Hamming codes 
CTFHTB CA 2023. Memory dump analysis. Rust reversing. PowerShell logs. C# .NET decompilation. XOR cipher 
CTFHTB CA 2023. Network traffic analysis. PowerShell deobfuscation. C# .NET decompilation. Steganography. AES cipher 
CTFHTB CA 2023. Network traffic analysis. Bash deobfuscation. Finding cryptographic keys. AES cipher 
CTFHTB CA 2023. Malware analysis. Batch and PowerShell deobfuscation. AES cipher. C# .NET decompilation 
CTFHTB CA 2023. Disk image. Alternate Data Streams. PowerShell deobfuscation 
CTFHTB CA 2023. Network traffic analysis. PHP deobfuscation 
CTFHTB CA 2023. ECC. Binary search. Finding curve parameters. Smart’s attack. PRNG 
CTFHTB CA 2023. Schnorr signature. Hidden Number Problem. LLL lattice reduction 
CTFHTB CA 2023. ECC. Finding curve parameters. Coppersmith method on a bivariate polynomial 
CTFHTB CA 2023. ECC. Finding curve parameters 
CTFHTB CA 2023. Schnorr signature. MD5 collision 
CTFHTB CA 2023. Matrix operations. Chinese Remainder Theorem 
CTFHTB CA 2023. AES cipher. XOR properties 
CTFHTB CA 2023. RSA. Cube Root Attack