Published onApril 23, 2025Ethernaut Challenge Series Part- 1EthernautSoliditySmart-Contract-HackingFoundryExploit a smart contract by hijacking ownership through its fallback mechanism.
Published onSeptember 29, 2024TheCyberThesisCtf F-24 - Web - CookieWebctfCookieWriteupManipulate the cookie to get the admin access.
Published onSeptember 22, 2024TheCyberThesis'24 - Cryptography - The Blockchain breachCryptographyctfBlockchainWriteupMD5-hash-collisionRecognize the pattern of a dataset to breach the blockchain.
Published onAugust 5, 2024MemLab Series-Lab 6Digital-ForensicsctfMemory-dumpVolatilityMemLabsRecover the data from the chrome history of a memory dump.
Published onJuly 31, 2024MemLab Series-Lab 5Digital-ForensicsctfMemory-dumpVolatilityMemLabsInvestigate strange files and a crashing application from a memory dump.
Published onJuly 30, 2024MemLab Series-Lab 4Digital-ForensicsctfMemory-dumpVolatilityMemLabsRecover deleted file from memory dump using volatility.
Published onJuly 28, 2024MemLab Series-Lab 3Digital-ForensicsctfMemory-dumpVolatilityMemLabsRecover encrypted information using steghide from memory dump.
Published onJuly 27, 2024MemLab Series-Lab 2Digital-ForensicsctfMemory-dumpVolatilityMemLabsGiven memory dump, Recover data from activist's memory dump..
Published onJuly 26, 2024MemLab Series-Lab 1Digital-ForensicsctfMemory-dumpVolatilityMemLabsRecover important files from crashed system's memory dump.
Published onJuly 25, 2024MemLab Series-Lab 0Digital-ForensicsctfMemory-dumpVolatilityMemLabsGiven memory dump, find user activity and flag.A sample challenge.