Published onJanuary 27, 2025PCC CTF - Babys First Step ROP Challenge WriteupPCC25-QUALpwnropret2winbinary-exploitationctfROP challenge demonstrating ret2win technique. Used ROP gadgets to call win function with correct arguments and gain shell access.
Published onJanuary 27, 2025PCC CTF - Pwn101 Buffer Overflow Challenge WriteupPCC25-QUALpwnbuffer-overflowbinary-exploitationctfmemory-corruptionClassic buffer overflow challenge demonstrating memory corruption techniques. Overwrote critical variables to gain shell access.
Published onJanuary 27, 2025PCC CTF - Flag Generator Reverse Engineering WriteupPCC25-QUALreverse-engineeringjavaspring-bootclassfinalaesctfJava Spring Boot application reverse engineering challenge. Bypassed ClassFinal obfuscation to analyze license validation and generate valid license keys.
Published onJanuary 27, 2025PCC CTF - ROP Reverse Engineering Challenge WriteupPCC25-QUALreverse-engineeringropxorctfbinary-analysisReverse engineering challenge disguised as ROP exploitation. Analyzed ROP chain to extract XOR keys and decrypt the flag.
Published onJanuary 27, 2025PCC CTF - Reverse Flag Validator WriteupPCC25-QUALreverse-engineeringxorbinary-analysisctfstatic-analysisReverse engineering challenge involving XOR decryption. Analyzed binary to extract encrypted data and decrypt using XOR key to reveal the flag.