CTF Write-ups

Detailed Capture the Flag (CTF) write-ups covering real-world scenarios, web exploitation, reverse engineering, Crypto, Boot2Root, and more. Learn practical hacking techniques step-by-step and improve your skills with walkthroughs of popular CTF challenges.

Assessment Methodologies: Information Gathering CTF 1 — eJPTv2 Walkthrough

Assessment Methodologies: Information Gathering CTF 1 — eJPTv2 Walkthrough Last updated: July 09, 2025 Hi everyone! In this article, we will solve the Assessment Methodologies: Information Gathering CTF 1 (eJPTv2). I will not share the flags because I don’t want you to copy and paste them, but rather solve it yourself and follow my instructions, […]

Assessment Methodologies: Information Gathering CTF 1 — eJPTv2 Walkthrough Read More »

Chronohack – PicoCTF WriteUP | Reverse Engineering

Chronohack – PicoCTF WriteUP | Reverse Engineering Last updated: July 09, 2025 Hi! In this write-up, we will look at how to solve the Chronohack – Reverse Engineering Challenge in PicoCTF. So let’s dive in without wasting any time! Description: Can you guess the exact token and unlock the hidden flag? Our school relies on

Chronohack – PicoCTF WriteUP | Reverse Engineering Read More »

SSTI2 PicoCTF: Web Exploitation | walkthrough

SSTI2 PicoCTF: Web Exploitation | walkthrough Last updated: July 09, 2025 Hi everyone! In this walkthrough, we will explore the SSTI2 Web Exploitation (Medium Level) Challenge. Let’s go! So just launch the Instance. After launching it, you will see a web page like: As from the Challenge name, its actually a server-side template injection (SSTI),

SSTI2 PicoCTF: Web Exploitation | walkthrough Read More »