Published onJanuary 27, 2025PCC CTF - ROP Reverse Engineering Challenge WriteupPCC25-QUALreverse-engineeringropxorctfbinary-analysisReverse engineering challenge disguised as ROP exploitation. Analyzed ROP chain to extract XOR keys and decrypt the flag.
Published onJanuary 27, 2025PCC CTF - Reverse Flag Validator WriteupPCC25-QUALreverse-engineeringxorbinary-analysisctfstatic-analysisReverse engineering challenge involving XOR decryption. Analyzed binary to extract encrypted data and decrypt using XOR key to reveal the flag.
Published onJanuary 27, 2025PCC CTF - L33tSpeak Web Challenge WriteupPCC25-QUALweblfiphpctffilter-chainsWeb application with Local File Inclusion vulnerability. Exploited using PHP filter chains to bypass restrictions and read the flag.