Published onJanuary 27, 2025PCC CTF - AshfaqVM Complete Reverse Engineering WriteupPCC25-QUALreverse-engineeringvmcustom-architecturecryptographyctfComplete reverse engineering of AshfaqVM - a custom virtual machine with encrypted flag validation. Includes VM architecture analysis, tool development, and algorithm reversal.
Published onJanuary 27, 2025PCC CTF - Forensic Tampered Challenge WriteupPCC25-QUALforensicscryptographyctfxorbash-historyForensic analysis of tampered AI research files using XOR encryption. Recovered the flag by analyzing bash history and finding hidden keys.
Published onJanuary 27, 2025PCC CTF - Bash Challenge WriteupPCC25-QUALmiscbashparameter-expansionwildcardsctfBash challenge with character filtering restrictions. Used parameter expansion and wildcards to bypass filters and execute /readflag.
Published onJanuary 27, 2025PCC CTF - Python Injection Challenge WriteupPCC25-QUALmiscpythoninjectionexecctfcode-injectionPython code injection challenge. Exploited exec() vulnerability by injecting malicious code through password parameter to read the flag.
Published onJanuary 27, 2025PCC CTF - Babys First Step ROP Challenge WriteupPCC25-QUALpwnropret2winbinary-exploitationctfROP challenge demonstrating ret2win technique. Used ROP gadgets to call win function with correct arguments and gain shell access.