
Hack The Box. Challenges. Pwn
24 minutes to read
64-bit binary. Heap exploitation. Safe-linking. Out-of-bounds write. Tcache poisoning. Exit handlers

Hack The Box. Challenges. Crypto
5 minutes to read
Custom hash function. Bit operations

Hack The Box. Challenges. Crypto
2 minutes to read
Miller-Rabin primality test

Hack The Box. Challenges. Crypto
2 minutes to read
Modular arithmetic

Hack The Box. Challenges. Web
4 minutes to read
Stack-based SQL injection

Hack The Box. Challenges. Web
3 minutes to read
PHP. Type Juggling

Hack The Box. Challenges. Reversing
5 minutes to read
Substitution cipher

Hack The Box. Challenges. Web
2 minutes to read
Server-Side Template Injection

Hack The Box. Challenges. Crypto
3 minutes to read
RSA. Greatest Common Divisor

Hack The Box. Challenges. Crypto
3 minutes to read
AES cipher modes. Stream cipher. Known plaintext attack

picoCTF 2021. Cryptography
1 minute to read
20 points. Factorization. RSA decryption