Published onJanuary 27, 2025PCC CTF - Pwn101 Buffer Overflow Challenge WriteupPCC25-QUALpwnbuffer-overflowbinary-exploitationctfmemory-corruptionClassic buffer overflow challenge demonstrating memory corruption techniques. Overwrote critical variables to gain shell access.
Published onJanuary 27, 2025PCC CTF - Flag Generator Reverse Engineering WriteupPCC25-QUALreverse-engineeringjavaspring-bootclassfinalaesctfJava Spring Boot application reverse engineering challenge. Bypassed ClassFinal obfuscation to analyze license validation and generate valid license keys.
Published onJanuary 27, 2025PCC CTF - ROP Reverse Engineering Challenge WriteupPCC25-QUALreverse-engineeringropxorctfbinary-analysisReverse engineering challenge disguised as ROP exploitation. Analyzed ROP chain to extract XOR keys and decrypt the flag.
Published onJanuary 27, 2025PCC CTF - Reverse Flag Validator WriteupPCC25-QUALreverse-engineeringxorbinary-analysisctfstatic-analysisReverse engineering challenge involving XOR decryption. Analyzed binary to extract encrypted data and decrypt using XOR key to reveal the flag.
Published onJanuary 27, 2025PCC CTF - L33tSpeak Web Challenge WriteupPCC25-QUALweblfiphpctffilter-chainsWeb application with Local File Inclusion vulnerability. Exploited using PHP filter chains to bypass restrictions and read the flag.