Hack The Box. Challenges. Pwn
24 minutes to read
64-bit binary. Heap exploitation. Safe-linking. Out-of-bounds write. Tcache poisoning. Exit handlers
Hack The Box. Challenges. Crypto
5 minutes to read
Custom hash function. Bit operations
Hack The Box. Challenges. Crypto
2 minutes to read
Miller-Rabin primality test
Hack The Box. Challenges. Crypto
2 minutes to read
Modular arithmetic
Hack The Box. Challenges. Web
4 minutes to read
Stack-based SQL injection
Hack The Box. Challenges. Web
3 minutes to read
PHP. Type Juggling
Hack The Box. Challenges. Reversing
5 minutes to read
Substitution cipher
Hack The Box. Challenges. Web
2 minutes to read
Server-Side Template Injection
Hack The Box. Challenges. Crypto
3 minutes to read
RSA. Greatest Common Divisor
Hack The Box. Challenges. Crypto
3 minutes to read
AES cipher modes. Stream cipher. Known plaintext attack
picoCTF 2021. Cryptography
1 minute to read
20 points. Factorization. RSA decryption