CTF Challenge Writeups
Capture The Flag competitions are an excellent way to develop security skills across multiple domains. Here you'll find writeups from various CTF competitions and challenges.
Challenge Categories
Web Exploitation
- SQL Injection
- Cross-Site Scripting (XSS)
- Server-Side Request Forgery (SSRF)
- Authentication bypasses
- File inclusion vulnerabilities
Binary Exploitation (Pwn)
- Buffer overflows
- Return-oriented programming (ROP)
- Format string vulnerabilities
- Heap exploitation
- Shellcoding
Cryptography
- Classical ciphers
- RSA challenges
- Hash functions
- Block cipher modes
- Cryptanalysis
Reverse Engineering
- Binary analysis
- Decompilation and deobfuscation
- Anti-debugging techniques
- Malware analysis
- Crackmes
Forensics
- Memory forensics
- Network packet analysis
- Steganography
- Log analysis
- Disk forensics
Miscellaneous
- OSINT (Open Source Intelligence)
- Programming challenges
- Logic puzzles
- Trivia
ℹ️ Info: CTF writeups are published after competitions have concluded to avoid spoiling active challenges.
CTF Platforms
Challenges covered from:
- picoCTF: Great for beginners
- HackTheBox CTFs: Seasonal team-based competitions
- CTFtime Events: Various online CTFs
- Local Competitions: University and regional CTFs
Coming Soon
CTF writeups will be added as competitions are completed. Each writeup includes:
- Challenge description and files
- Solution methodology
- Code/scripts used
- Flag and verification
- Lessons learned
Check back regularly for new CTF writeups!