Discover vulnerabilities in a custom RSA and AES implementation, exploit APIs to elevate to admin, and retrieve the hidden flag through clever cryptographic techniques.
Learn how to solve an ECDSA biased-k lattice attack to uncover the original private key and hidden flag using MSB manipulation and brute force techniques.
Help Blitzen, Prancer, Comet, and Dancer crack passwords, decode hidden files, and solve cryptographic puzzles as they prepare for their grand symphony!
Explore how to reverse-engineer a ransomware binary, bypass anti-VM checks, decrypt AES-encrypted files, and exploit web vulnerabilities to recover encrypted files.
Learn how to extract flags from a Windows system running in Wine using netcat, VBS scripts, and hex editors to solve a challenging cybersecurity puzzle.
Using Volatility 3 and a custom Notepad plugin, we extracted unsaved text from memory, revealing a password. Steghide then uncovered a hidden flag in a QR code.
Explore how to analyze a 2GB memory dump, recover hidden files, crack passwords with Hashcat, and uncover secrets using forensic tools in this detailed guide.