CTF Challenge Writeups

Capture The Flag competitions are an excellent way to develop security skills across multiple domains. Here you'll find writeups from various CTF competitions and challenges.

Challenge Categories

Web Exploitation

  • SQL Injection
  • Cross-Site Scripting (XSS)
  • Server-Side Request Forgery (SSRF)
  • Authentication bypasses
  • File inclusion vulnerabilities

Binary Exploitation (Pwn)

  • Buffer overflows
  • Return-oriented programming (ROP)
  • Format string vulnerabilities
  • Heap exploitation
  • Shellcoding

Cryptography

  • Classical ciphers
  • RSA challenges
  • Hash functions
  • Block cipher modes
  • Cryptanalysis

Reverse Engineering

  • Binary analysis
  • Decompilation and deobfuscation
  • Anti-debugging techniques
  • Malware analysis
  • Crackmes

Forensics

  • Memory forensics
  • Network packet analysis
  • Steganography
  • Log analysis
  • Disk forensics

Miscellaneous

  • OSINT (Open Source Intelligence)
  • Programming challenges
  • Logic puzzles
  • Trivia

ℹ️ Info: CTF writeups are published after competitions have concluded to avoid spoiling active challenges.

CTF Platforms

Challenges covered from:

  • picoCTF: Great for beginners
  • HackTheBox CTFs: Seasonal team-based competitions
  • CTFtime Events: Various online CTFs
  • Local Competitions: University and regional CTFs

Coming Soon

CTF writeups will be added as competitions are completed. Each writeup includes:

  • Challenge description and files
  • Solution methodology
  • Code/scripts used
  • Flag and verification
  • Lessons learned

Check back regularly for new CTF writeups!