Alkanor
23
Place18650
Points430
Challenges29
Compromissions
76%
App - Script
690 Points25 / 33
- o Bash - System 1
- o sudo - faiblesse de configuration
- o Bash - System 2
- o LaTeX - Input
- o Powershell - Command injection
- x AppArmor - Jail Introduction
- o Bash - unquoted expression injection
- x Docker - I am groot
- o Perl - Command injection
- o Powershell - SecureString
- o Bash - cron
- o LaTeX - Execution de commandes
- o Python - input()
- x R : exécution de code
- o Powershell - Basic jail
- o Python - pickle
- o Bash - quoted expression injection
- x Docker - Sys-Admin’s Docker
- o Shared Objects hijacking
- o SSH - Agent Hijacking
- x AppArmor - Jail Medium
- o Bash - race condition
- x Docker - Talk through me
- o Python - format string
- o Python - PyJail 1
- o PHP - Jail
- o Python - PyJail 2
- o Python - Jail - Exec
- o Javascript - Jail
- o Python - Jail - Garbage collector
- o Bash - Shells restreints
- x Python - Eval Is Evil
- x Deep learning - Modèle malveillant
89%
App - Système
6305 Points83 / 93
- o ELF x86 - Stack buffer overflow basic 1
- x ELF x64 - Basic heap overflow
- o ELF x86 - Stack buffer overflow basic 2
- o PE32 - Stack buffer overflow basic
- o ELF x86 - Format string bug basic 1
- o ELF x64 - Stack buffer overflow - basic
- o ELF x86 - Format string bug basic 2
- o ELF x86 - Race condition
- o ELF ARM - Stack buffer overflow - basic
- o ELF MIPS - Stack buffer overflow - No NX
- o ELF x64 - Double free
- o ELF x86 - Stack buffer overflow basic 3
- o ELF x86 - Use After Free - basic
- o ELF ARM - Stack Spraying
- o ELF x64 - Stack buffer overflow - PIE
- o ELF x86 - BSS buffer overflow
- o ELF x86 - Stack buffer overflow basic 4
- o ELF x86 - Stack buffer overflow basic 6
- o ELF x86 - Format String Bug Basic 3
- o PE32 - Stack buffer overflow avancé
- o ELF ARM - Basic ROP
- o ELF MIPS - Basic ROP
- x ELF RISC-V - Intro - let’s do the ROP
- x ELF x64 - Stack buffer overflow - Stack pivot
- o ELF x86 - Stack buffer overflow - C++ vtables
- o PE32+ Format string bug
- o ELF x64 - Logic bug
- o ELF x86 - Bug Hunting - Plusieurs problèmes
- o ELF x86 - Stack buffer and integer overflow
- o ELF x86 - Stack buffer overflow - ret2dl_resolve
- o ELF x86 - Stack buffer overflow basic 5
- o ELF x64 - Stack buffer overflow - avancé
- o ELF MIPS - Format String Glitch
- o ELF x64 - Heap Filling
- o ELF x86 - Information leakage with Stack Smashing Protector
- o ELF x64 - File Structure Hacking
- o ELF ARM - Race condition
- o ELF x64 - Browser exploit - Intro
- x ELF x64 - Buggy VM
- o ELF x64 - Heap Safe-Linking Bypass
- o ELF x64 - ret2dl_init
- o ELF x86 - Out of bounds attack - French Paradox
- o ELF x86 - Remote BSS buffer overflow
- o ELF x86 - Remote Format String bug
- o PE32+ Basic ROP
- o ELF x64 - Remote heap buffer overflow - tcache
- o ELF x86 - Blind remote format string bug
- o LinKern ARM - syscall vulnérable
- o LinKern x86 - Buffer overflow basic 1
- o ELF x64 - Sigreturn Oriented Programming
- o LinKern x86 - Null pointer dereference
- x ELF x64 - Syscall chaining
- o LinKern x64 - Race condition
- o ELF ARM - Shellcode alphanumérique
- o ELF MIPS - URLEncoded Format String bug
- x ELF x64 - Blind SROP
- x ELF x64 - Heap Hop
- o ELF x86 - Hardened binary 1
- o ELF x86 - Hardened binary 2
- o ELF x86 - Hardened binary 3
- o ELF x86 - Hardened binary 4
- o LinKern MIPSel - Vulnerable ioctl
- o LinKern x64 - code réentrant
- o ELF ARM - Heap format string bug
- o ELF ARM - Format String bug
- o ELF ARM - Use After Free
- o ELF x64 - FILE structure hijacking
- o ELF x64 - Heap feng-shui
- o ELF x64 - Off-by-one bug
- o ELF x86 - Hardened binary 5
- o LinKern ARM - Stack Overflow
- o LinKern x86 - basic ROP
- o ELF ARM - Heap Off-by-One
- x ELF x64 - Advanced blind format string exploitation
- o ELF x64 - Remote Heap buffer overflow 1
- o ELF x86 - Hardened binary 6
- o ELF x86 - Hardened binary 7
- o ELF x86 - Remote stack buffer overflow - Hardened
- o LinKern x64 - RowHammer
- o LinKern x64 - SLUB off-by-one
- o ELF ARM - Heap buffer overflow - Wilderness
- o ELF ARM - Heap Overflow
- x ELF ARM64 - Heap Underflow
- o ELF x64 - Seccomp Whitelist
- o ELF x86 - Blind ROP
- o LinKern x64 - Memory exploration
- o WinKern x64 - Stack buffer overflow avancé - ROP
- o WinKern x64 - Use After Free
- o ELF x64 - Remote Heap buffer overflow 2
- o ELF x64 - Advanced Heap Exploitation - Heap Leakless & Fortified
- o ELF x64 - Blind ROP
- o ELF x64 - Browser exploit - BitString
- x ELF ARM64 - Multithreading
73%
Cracking
1865 Points48 / 66
- o ELF x86 - 0 protection
- o ELF x86 - Basique
- o PE x86 - 0 protection
- o ELF C++ - 0 protection
- x Godot - 0 protection
- o PE DotNet - 0 protection
- x APK - Introduction
- o ELF MIPS - Basic Crackme
- o ELF x64 - Golang basique
- o ELF x86 - Fake Instructions
- o ELF x86 - Ptrace
- x Godot - Bytecode
- o WASM - Introduction
- x APK - Flutter Debug
- o ELF ARM - Basic Crackme
- o ELF x64 - Basic KeygenMe
- x Gestion de sauvegarde sous Unity3D
- x Godot - Mono
- o PE DotNet - Basic Anti-Debug
- o PE DotNet - Basic Crackme
- o PYC - ByteCode
- o ELF x86 - Pas de points d’arrêt logiciels
- o Lua - Bytecode
- o MachO x64 - keygenme or not
- o ELF ARM - crackme 1337
- o ELF x86 - CrackPass
- o ELF x86 - ExploitMe
- o ELF x86 - Random Crackme
- o GB - Basic GameBoy crackme
- o PDF - Javascript
- o PE x86 - Xor Madness
- o Powershell DeObfuscation
- o ELF ARM - Crypted
- o ELF x64 - Automatisation du crackme
- x Godot - Modèle 3D
- x NRO ARM - Switch homebrew
- o PE x86 - SEHVEH
- o APK - Anti-debug
- o APK - Insomni’Droid
- x ELF x64 - Rust backdoor
- x ELF x64 - Rust Crackme
- x PE x64 - UEFI Secure Boot
- o APK - Root My Droid
- o ELF x64 - Nanomites - Introduction
- o ELF x86 - Anti-debug
- o PE DotNet - KeygenMe
- x PE x64 - Bazar dans les tables
- o PE x86 - AutoPE
- x PYC - Self Modifying (Byte)Code
- x PYC - Snakeygen
- o ELF x86 - KeygenMe
- x HackerMan
- x Unity - Mono - Basic Game Hacking
- o WASM - Trouvez le PNJ
- o Bash - VM
- o ELF x64 - KeyGenMe
- o ELF x64 - Anti-debug et equations
- x Unity - IL2CPP - Basic Game Hacking
- o ELF x64 - Nanomites
- o ELF x86 - Packed
- o PE x86 - RunPE
- o ELF x86 - VM
- o ELF x64 - Hidden Control Flow
- o Ringgit
- x Voracious Nanomites
- o White-Box Cryptography #2
80%
Cryptanalyse
1810 Points56 / 70
- o Encodage - ASCII
- o Encodage - UU
- o Hash - DCC
- o Hash - DCC2
- o Hash - LM
- o Hash - Message Digest 5
- o Hash - NT
- o Hash - SHA-2
- o Chiffrement par décalage
- o CISCO - Salted Password
- o Décomposition pixelisée
- o ELF64 - Chiffrement avec le PID
- o Fichier - PKZIP
- o Substitution monoalphabétique - César
- x Circular Bit Shift
- o Clair connu - XOR
- o Code - Pseudo Random Number Generator
- x Encodage - Codebook
- x Fichier - PKZIP 2
- o File - Insecure storage 1
- o Substitution polyalphabétique - Vigenère
- o Système - Android lock pattern
- o Transposition - Rail Fence
- o AES - CBC - Bit-Flipping Attack
- o AES - ECB
- x AES - ECB - Copy Paste
- o LFSR - Clair connu
- o RSA - Factorisation
- o RSA - Oracle de déchiffrement
- o Service - Timing attack
- o Substitution monoalphabétique - Polybe
- o Twisted secret
- o Vecteur d’initialisation
- x Chiffre de Hill
- o GEDEFU
- o OTP - Erreur d’implémentation
- o RSA - Clé privée corrompue 1
- o RSA - Fractions continues
- o RSA - Modules communs
- o Service - Hash length extension attack
- x Shamir Secret Sharing - Introduction
- o AES - 4 tours
- o ECDSA - Introduction
- o RSA - Padding
- o RSA - Signature
- x Shamir Secret Sharing - Traitor
- o AES128 - CTR
- x PHP - mt_rand
- o Problème du logarithme discret
- o RSA - Clé privée corrompue 2
- o RSA - Clé privée corrompue 3
- o RSA - Multiples destinataires
- o AES - Attaque par fautes #1
- x FEAL - Cryptanalyse différentielle
- o Machine Enigma
- x Side Channel - AES : CPA
- o ECDHE
- x RSA - H-rabin
- o RSA - Lee cooper
- o Service - CBC Padding
- x Side Channel - AES : premier round
- o Substitution polyalphabétique - Masque jetable
- o White-Box Cryptography
- o AES - Variante affaiblie
- x Shamir Secret Sharing - Reduction
- o Hash - SHA-3
- o AES - Attaque par fautes #2
- x Shamir Secret Sharing - Irreductible ?
- o AES-PMAC
- o ECDSA - Erreur d’implémentation
52%
Forensic
900 Points23 / 44
- x Fichier supprimé
- x Capture moi ça
- o Command & Control - niveau 2
- x MasterKee
- x Oh My Grub
- x Docker layers
- x Windows - LDAP User KerbeRoastable
- x Windows - NTDS Extraction de secrets
- o Analyse de logs - attaque web
- o Command & Control - niveau 5
- x Supply chain attack - Docker
- o Trouvez le chat
- o Vilain petit canard
- x Windows - LDAP User ASRepRoastable
- o Active Directory - GPO
- o Command & Control - niveau 3
- o Exfiltration DNS
- x Open My Vault
- x Web3 - Mets ton masque - Etape 1
- x C2 Mythic
- o Command & Control - niveau 4
- o Entretien à l’ANSSI
- o Keylogger maison
- o macOS - Keychain
- o Macro Word malveillante
- o Ransomware Android
- x Supply chain attack - Python
- x Exfiltration air-gap
- x iOS - Introduction
- x The Artist
- o Multi-devices
- o Command & Control - niveau 6
- o Find me
- o Rootkit - Cold case
- o Second entretien à l’ANSSI
- x Web3 - Mets ton masque - Etape 2
- o Find me again
- o Find me back
- x Find me on Android
- o Zeus Bot
- o Try again
- x The Lost Case - Investigation Mobile
- x Remote Support
- x Try again 2
48%
Programmation
510 Points14 / 29
- x TCP - Retour au collège
- x TCP - Chaîne encodée
- x TCP - La roue romaine
- x TCP - Uncompress Me
- o CAPTCHA me if you can
- x Deep Learning - Introduction
- o Ethereum - Tutoreum
- o Suite mathématique
- o ELF x64 - Shellcoding - Sheep warmup
- x Ethereum - tx.origin
- x Solveur de polynômes du second degré
- o Ethereum - Takeover
- o Multiples encodages
- x Apprenti Scraper
- o ARM - Shellcoding - Egg hunter
- x Ethereum - Bunker
- o Ethereum - NotSoPriv8
- x Adversarial Attack - GAN
- x Deep Learning - Captcha
- o ELF x64 - Shellcoding - Polymorphism
- x Ethereum - Architecte
- x Ethereum - Reentrancy
- o Quick Response Code
- o WinKern x64 - shellcoding : vol de token
- o Ethereum - BadStack
- o ELF x64 - Sandbox shellcoding
- x Ethereum - King of the EVM
- o ELF x86 - Shellcoding - Alphanumeric
- x Adversarial Attack - Prison Break
65%
Réaliste
2335 Points39 / 60
- o Eh oui, parfois
- x End Droid
- x Windows - KerbeRoast
- x ComCyber - Challenge
- o P0wn3d
- x Windows - ASRepRoast
- x Windows - Group Policy Preferences Passwords
- o The h@ckers l4b
- x Windows - ZeroLogon
- o Néonazi à l’intérieur
- x Windows - krbtgt history
- x Windows - sAMAccountName spoofing
- x Mersenne with 2
- o Bash/Awk - parsing netstat
- o Breaking Root-Me like it’s 2020
- o PyRat Enchères
- o Root them
- o IPBX - call me maybe
- o Marabout
- o Root-We
- o Starbug Bounty
- o Ultra Upload
- o Well-known
- o A bittersweet shellfony
- o Bash - System Disaster
- o Django unchained
- o Imagick
- o MALab
- o SSHocker
- o Web TV
- x DasBox1 : du Rififi chez les hommes-lézards
- o SamBox v2
- o SamCMS
- o BBQ Factory - First Flirt
- x Extractor
- x Getting root Over it !
- x reCOINier
- o Texode
- o BBQ Factory - Back To The Grill
- o Dans ton Kube
- x DjangocatZ
- o Red Pills
- x Root Me, for real
- o SamBox v1
- o SAP Pentest 007
- o Crypto Secure
- o Hôpital Bozobe
- o SamBox v3
- o ARM FTP Box
- x Bohemian RhapC2
- x I’m a Bl4ck H4t
- o SAP Pentest 000
- x Texode Back
- o Bluebox 2 - Pentest
- x Nodeful
- x Matrix terminal
- o Bluebox - Pentest
- x C comme C-curisé
- o Highway to shell
- o SamBox v4
70%
Réseau
500 Points23 / 33
- o FTP - Authentification
- o TELNET - authentification
- o ETHERNET - trame
- x Kerberos - Authentification
- x NTLM - Authentification
- o Authentification twitter
- o Bluetooth - Fichier inconnu
- o CISCO - mot de passe
- o DNS - transfert de zone
- o IP - Time To Live
- o LDAP - null bind
- x OSPF - Authentification
- o POP - APOP
- o RF - AM Transmission
- x Extraction de données
- o RF - FM Transmission
- o RF - Key Fixed Code
- o SIP - Authentification
- o ETHERNET - Transmission altérée
- o Trafic Global System for Mobile communications
- o HTTP - DNS Rebinding
- o SSL - échange HTTP
- o Netfilter - erreurs courantes
- o SNMP - Authentification
- o Wired Equivalent Privacy
- o Charge ICMP
- x ARP Spoofing - Écoute active
- o XMPP - Authentification
- x RF - Transmission satellite
- x WPA2 - Enterprise
- x ARP Spoofing - L’homme du milieu
- x RF - Bande L
- x WPA3 - SAE
78%
Stéganographie
400 Points18 / 23
- x EXIF - Metadata
- o Point à la ligne
- o Steganomobile
- o Twitter Secret Messages
- o TXT - George et Alfred
- o WAV - Analyse de bruit
- o Poem from Space
- o Points jaunes
- o EXIF - Miniature
- x Mimic - Dummy sight
- o WAV - Analyse spectrale
- x APNG - Just A PNG
- o Crypt-art
- x ELF x64 - Duality
- o PDF - Embedded
- x Genius ID
- o Kitty spy
- o PNG - Least Significant Bit
- o PNG - Pixel Indicator Technique
- o PNG - Pixel Value Differencing
- o Angecryption
- o Base Jumper
- o Hide and seek
67%
Web - Client
1040 Points28 / 42
- o HTML - boutons désactivés
- o Javascript - Authentification
- o Javascript - Source
- o Javascript - Authentification 2
- o Javascript - Obfuscation 1
- o Javascript - Obfuscation 2
- o Javascript - Native code
- o Javascript - Webpack
- o Javascript - Obfuscation 3
- o XSS - Stockée 1
- x AST - Deobfuscation
- o CSP Bypass - Inline code
- x CSP Bypass - Nonce 2
- o CSRF - 0 protection
- o Web Socket - 0 protection
- o XSS DOM Based - Introduction
- o Flash - Authentification
- x XSS DOM Based - AngularJS
- o XSS DOM Based - Eval
- o CSP Bypass - Dangling markup
- o CSP Bypass - JSONP
- o CSRF - contournement de jeton
- o XSS - Volatile
- o CSP Bypass - Dangling markup 2
- x CSP Bypass - Nonce
- x CSS - Exfiltration
- o Javascript - Obfuscation 4
- x Relative Path Overwrite
- o XSS - Stockée 2
- o XSS DOM Based - Filters Bypass
- x Self XSS - DOM Secrets
- x CSPT - The Ruler
- x DOM Clobbering
- x Javascript - Obfuscation 6
- x Self XSS - Race Condition
- x Browser - bfcache / disk cache
- o HTTP Response Splitting
- o Javascript - Obfuscation 5
- x XS Leaks
- o XSS - Stored - contournement de filtres
- o XSS - DOM Based
- x Same Origin Method Execution
76%
Web - Serveur
2295 Points73 / 96
- o HTML - Code source
- o HTTP - Contournement de filtrage IP
- o HTTP - Open redirect
- o HTTP - User-agent
- o Mot de passe faible
- o PHP - Injection de commande
- x API - Broken Access
- o Fichier de sauvegarde
- o HTTP - Directory indexing
- o HTTP - Headers
- o HTTP - POST
- o HTTP - Redirection invalide
- o HTTP - Verb tampering
- o Install files
- x Nginx - Alias Misconfiguration
- x Nginx - Root Location Misconfiguration
- x API - Mass Assignment
- o CRLF
- o File upload - Double extensions
- o File upload - Type MIME
- x Flask - Unsecure session
- x GraphQL - Introspection
- o HTTP - Cookies
- o Insecure Code Management
- o JWT - Introduction
- x XSS - Server Side
- o Directory traversal
- o File upload - Null byte
- o JWT - Jeton révoqué
- o JWT - Secret faible
- x JWT - Unsecure File Signature
- o PHP - assert()
- x PHP - Configuration Apache
- o PHP - Filters
- o PHP - Register globals
- o PHP - Remote Xdebug
- o Python - Server-side Template Injection Introduction
- o File upload - ZIP
- x Flask - Development server
- x GraphQL - Injection
- o Injection de commande - Contournement de filtre
- o Java - Server-side Template Injection
- o JWT - Clé publique
- x JWT - Header Injection
- o Local File Inclusion
- o Local File Inclusion - Double encoding
- x Nginx - SSRF Misconfiguration
- o Node - Eval
- o PHP - Loose Comparison
- o PHP - preg_replace()
- o PHP - Type juggling
- o Remote File Inclusion
- o SQL injection - Authentification
- o SQL injection - Authentification - GBK
- o SQL injection - String
- o XSLT - Exécution de code
- x Elixir - EEx
- x JWT - Unsecure Key Handling
- o LDAP injection - Authentification
- o Node - Serialize
- o NoSQL injection - Authentification
- o PHP - Path Truncation
- o PHP - Sérialisation
- o SQL injection - Numérique
- o SQL Injection - Routed
- o SQL Truncation
- o XML External Entity
- o XPath injection - Authentification
- o Yaml - Deserialization
- x API - Broken Access 2
- x GraphQL - Backend injection
- o GraphQL - Mutation
- o Java - Spring Boot
- o Local File Inclusion - Wrappers
- o PHP - Eval
- x PHP - Eval - Contournement de filtres avancés
- o SQL injection - Error
- o SQL injection - Insert
- o SQL injection - Lecture de fichiers
- o XPath injection - String
- x File upload - Polyglot
- x NodeJS - Prototype Pollution Bypass
- o NoSQL injection - En aveugle
- o SQL injection - Time based
- x Java - Custom gadget deserialisation
- o NodeJS - vm escape
- o Server Side Request Forgery
- o SQL injection - En aveugle
- o LDAP injection - En aveugle
- o PHP - Unserialize overflow
- o PHP - Unserialize Pop Chain
- x SQL Injection - Second Order
- x Python dotenv
- o Python - SSTI contournement de filtres en aveugle
- o XPath injection - En aveugle
- o SQL injection - Contournement de filtres