Category: Capture The Flag (CTF)

CTF@CIT 2025 Write-Up: Blank Image (Steganography)

CTF@CIT 2025 Write-Up: Blank Image (Steganography)

Capture The Flag (CTF)

In the CTF@CIT 2025 cybersecurity competition, I participated in the Steganography category and came across an interesting challenge named "Blank Image". Despite appearing as a blank image, a clue in ...

Read More May 6, 2025
CTF@CIT 2025 Write-up: Breaking Authentication via SQL Injection

CTF@CIT 2025 Write-up: Breaking Authentication via SQL Injection

Capture The Flag (CTF)

In this challenge, we are presented with a seemingly innocent login form and a mysterious prompt: "Say my username." While it appears simple on the surface, this challenge requires a solid understandi...

Read More May 6, 2025
SKRCTF - Forgot Password Challenge: Exploiting Client-Side Authentication

SKRCTF - Forgot Password Challenge: Exploiting Client-Side Authentication

Capture The Flag (CTF)

The "Forgot Password" challenge from SKRCTF highlights a classic web security flaw commonly seen in beginner-level Capture The Flag (CTF) competitions. The challenge presents a simple login page where...

Read More May 5, 2025
SKRCTF: My First SQL – Beginner SQL Injection Challenge Writeup

SKRCTF: My First SQL – Beginner SQL Injection Challenge Writeup

Capture The Flag (CTF)

The "My First SQL" challenge from the SKRCTF series offers an accessible introduction to SQL injection (SQLi) vulnerabilities, making it an excellent starting point for individuals new to web security...

Read More May 5, 2025
SKRCTF: Where is the Flag? – Web CTF Challenge Writeup

SKRCTF: Where is the Flag? – Web CTF Challenge Writeup

Capture The Flag (CTF)

The "Where is the flag?" challenge from the SKRCTF series is a beginner-friendly web challenge that emphasises the importance of thorough inspection and attention to detail in web security.Challenge O...

Read More May 5, 2025
Reverse Engineering in picoCTF: A Journey Through Binaries, Bits, and Flags

Reverse Engineering in picoCTF: A Journey Through Binaries, Bits, and Flags

Capture The Flag (CTF)

Reverse engineering is a core skill in cybersecurity that involves analyzing a system, software, or binary to understand its design, functionality, or hidden components, often without access to its so...

Read More April 30, 2025
CTF Audio Steganography: Hands-On Strategies for Decoding Hidden Messages

CTF Audio Steganography: Hands-On Strategies for Decoding Hidden Messages

Capture The Flag (CTF)

In this class task, you will explore the fascinating field of Audio Steganography, where information is hidden within audio signals. Through a series of tasks in Part A and Part B, you will utilize sp...

Read More March 24, 2025