https://github.com/potreic/write-up-tpw-ctf-2024
CTF walkthrough solutions: web exploits (XXE Injection), binary overflows, cracking ciphers, and detecting in digital forensics. Break challenges & cat data.txt | grep flags! ๐ฏ
https://github.com/potreic/write-up-tpw-ctf-2024
binary-exploitation capture-the-flag cryptography cybersecurity digital-forensics web-exploitation
Last synced: 5 months ago
JSON representation
CTF walkthrough solutions: web exploits (XXE Injection), binary overflows, cracking ciphers, and detecting in digital forensics. Break challenges & cat data.txt | grep flags! ๐ฏ
- Host: GitHub
- URL: https://github.com/potreic/write-up-tpw-ctf-2024
- Owner: potreic
- Created: 2024-11-17T16:18:10.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2024-11-17T16:41:37.000Z (about 1 year ago)
- Last Synced: 2025-06-09T02:40:46.279Z (6 months ago)
- Topics: binary-exploitation, capture-the-flag, cryptography, cybersecurity, digital-forensics, web-exploitation
- Homepage:
- Size: 11.7 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Write-Ups TPW CTF 2024 ๐จ
Welcome to the **CTF Write-Up Repository**! This is a guide for solving various Capture The Flag (CTF) challenges. Intended for learning, practicing, or just curious, I've wrote detailed step-by-step solutions to help you understand and tackle each challenge.
## Repository Structure ๐
Hereโs how the repository is laid out:
- **webex/**
Learn about **XML External Entity (XXE) Injection**. This involves exploiting vulnerabilities in XML parsers to access sensitive server data. ๐ ๏ธ
- **binex/**
Dive into **binary exploitation** challenges. Specifically, we cover integer overflow issues, where adding two positive numbers (`n1 > 0` and `n2 > 0`) somehow gives you a negative result. ๐ค
- **crypto/**
Crack some codes with classic cryptographic techniques. This section includes challenges like brute-forcing Caesar ciphers and understanding how simple encryption works. ๐
- **forensic/**
Analyze corrupted hex data and TCP captures to uncover hidden information. Put your detective skills to the test. ๐ต๏ธโโ๏ธ
> **Note:** Each directory comes with its own `README.md` explaining the challenge in detail **AND** includes a challenge file or source code so you can try breaking it yourself. Perfect for hands-on learning! ๐ปโจ
---
## Whatโs in Each Section? ๐ค
### Web Exploitation (`webex`)
This section dives into **XXE Injection**โa vulnerability that can expose files or system information via XML parsing. You'll learn to craft payloads to exploit this vulnerability and understand how it works step by step.
### Binary Exploitation (`binex`)
Binary exploitation challenges here revolve around **integer overflow**, where numbers donโt behave as they should due to computational limits. This section explains how to detect the vulnerability and write an exploit for it.
### Cryptography (`crypto`)
Focuses on cracking encryption schemes like **Caesar ciphers**. The walkthroughs will show you how to script a brute-force attack and decode the flag.
### Forensics (`forensic`)
In this section, youโll analyze corrupted hex files or dissect TCP packet captures to recover hidden data. The walkthroughs explain tools and methods to get to the solution.
---
## How to Use This Repository ๐
1. Pick a category from the list above and go to its folder.
2. Read the `README.md` for an explanation of the challenge and the solution.
3. Try solving the included challenge files or source code to test your skills.
4. Refer to the write-ups if you get stuck or want to understand the approach better.
---
## A Quick Heads-Up โ ๏ธ
This repository is purely for **learning** and **practice**. Itโs meant to help you sharpen your cybersecurity skills in a safe environment. Always remember: **donโt use these techniques outside CTFs or without proper authorization**. Play fair and stay ethical!
---
๐ก๏ธ๐ค Happy Hacking, Fellas!๐ต๏ธโโ๏ธ๐