Secure Storage
Path Traversal + Known Plaintext Attack on XOR encryption
401 words
|
2 minutes
Addition 2
RSA Linearization Attack using Continued Fractions
307 words
|
2 minutes
Addition
RSA with e=3 and additive relation - Franklin-Reiter related-message attack
236 words
|
1 minute
Snake
Authentication bypass via backslash injection
135 words
|
1 minute
Pipeline
HTTP Request Pipelining to smuggle requests, extract JWKS, forge admin JWT
272 words
|
1 minute
Shredder
Reconstructing a shredded PNG file using CRC validation and DFS
496 words
|
2 minutes
We Go Gym
Network Forensics - TTL Covert Channel Data Exfiltration
409 words
|
2 minutes
AirSpeed
HTTP Parsing Discrepancy + Airspeed SSTI to RCE
183 words
|
1 minute