Tluarim
103553
Place120
Points10
Challenges0
Compromissions
0%
App - Script
0 Points0 / 33
- x Bash - System 1
- x sudo - faiblesse de configuration
- x Bash - System 2
- x LaTeX - Input
- x Powershell - Command injection
- x AppArmor - Jail Introduction
- x Bash - unquoted expression injection
- x Docker - I am groot
- x Perl - Command injection
- x Powershell - SecureString
- x Bash - cron
- x LaTeX - Execution de commandes
- x Python - input()
- x R : exécution de code
- x Powershell - Basic jail
- x Python - pickle
- x Bash - quoted expression injection
- x Docker - Sys-Admin’s Docker
- x Shared Objects hijacking
- x SSH - Agent Hijacking
- x AppArmor - Jail Medium
- x Bash - race condition
- x Docker - Talk through me
- x Python - format string
- x Python - PyJail 1
- x PHP - Jail
- x Python - PyJail 2
- x Python - Jail - Exec
- x Javascript - Jail
- x Python - Jail - Garbage collector
- x Bash - Shells restreints
- x Python - Eval Is Evil
- x Deep learning - Modèle malveillant
0%
App - Système
0 Points0 / 93
- x ELF x86 - Stack buffer overflow basic 1
- x ELF x64 - Basic heap overflow
- x ELF x86 - Stack buffer overflow basic 2
- x PE32 - Stack buffer overflow basic
- x ELF x86 - Format string bug basic 1
- x ELF x64 - Stack buffer overflow - basic
- x ELF x86 - Format string bug basic 2
- x ELF x86 - Race condition
- x ELF ARM - Stack buffer overflow - basic
- x ELF MIPS - Stack buffer overflow - No NX
- x ELF x64 - Double free
- x ELF x86 - Stack buffer overflow basic 3
- x ELF x86 - Use After Free - basic
- x ELF ARM - Stack Spraying
- x ELF x64 - Stack buffer overflow - PIE
- x ELF x86 - BSS buffer overflow
- x ELF x86 - Stack buffer overflow basic 4
- x ELF x86 - Stack buffer overflow basic 6
- x ELF x86 - Format String Bug Basic 3
- x PE32 - Stack buffer overflow avancé
- x ELF ARM - Basic ROP
- x ELF MIPS - Basic ROP
- x ELF RISC-V - Intro - let’s do the ROP
- x ELF x64 - Stack buffer overflow - Stack pivot
- x ELF x86 - Stack buffer overflow - C++ vtables
- x PE32+ Format string bug
- x ELF x64 - Logic bug
- x ELF x86 - Bug Hunting - Plusieurs problèmes
- x ELF x86 - Stack buffer and integer overflow
- x ELF x86 - Stack buffer overflow - ret2dl_resolve
- x ELF x86 - Stack buffer overflow basic 5
- x ELF x64 - Stack buffer overflow - avancé
- x ELF MIPS - Format String Glitch
- x ELF x64 - Heap Filling
- x ELF x86 - Information leakage with Stack Smashing Protector
- x ELF x64 - File Structure Hacking
- x ELF ARM - Race condition
- x ELF x64 - Browser exploit - Intro
- x ELF x64 - Buggy VM
- x ELF x64 - Heap Safe-Linking Bypass
- x ELF x64 - ret2dl_init
- x ELF x86 - Out of bounds attack - French Paradox
- x ELF x86 - Remote BSS buffer overflow
- x ELF x86 - Remote Format String bug
- x PE32+ Basic ROP
- x ELF x64 - Remote heap buffer overflow - tcache
- x ELF x86 - Blind remote format string bug
- x LinKern ARM - syscall vulnérable
- x LinKern x86 - Buffer overflow basic 1
- x ELF x64 - Sigreturn Oriented Programming
- x LinKern x86 - Null pointer dereference
- x ELF x64 - Syscall chaining
- x LinKern x64 - Race condition
- x ELF ARM - Shellcode alphanumérique
- x ELF MIPS - URLEncoded Format String bug
- x ELF x64 - Blind SROP
- x ELF x64 - Heap Hop
- x ELF x86 - Hardened binary 1
- x ELF x86 - Hardened binary 2
- x ELF x86 - Hardened binary 3
- x ELF x86 - Hardened binary 4
- x LinKern MIPSel - Vulnerable ioctl
- x LinKern x64 - code réentrant
- x ELF ARM - Heap format string bug
- x ELF ARM - Format String bug
- x ELF ARM - Use After Free
- x ELF x64 - FILE structure hijacking
- x ELF x64 - Heap feng-shui
- x ELF x64 - Off-by-one bug
- x ELF x86 - Hardened binary 5
- x LinKern ARM - Stack Overflow
- x LinKern x86 - basic ROP
- x ELF ARM - Heap Off-by-One
- x ELF x64 - Advanced blind format string exploitation
- x ELF x64 - Remote Heap buffer overflow 1
- x ELF x86 - Hardened binary 6
- x ELF x86 - Hardened binary 7
- x ELF x86 - Remote stack buffer overflow - Hardened
- x LinKern x64 - RowHammer
- x LinKern x64 - SLUB off-by-one
- x ELF ARM - Heap buffer overflow - Wilderness
- x ELF ARM - Heap Overflow
- x ELF ARM64 - Heap Underflow
- x ELF x64 - Seccomp Whitelist
- x ELF x86 - Blind ROP
- x LinKern x64 - Memory exploration
- x WinKern x64 - Stack buffer overflow avancé - ROP
- x WinKern x64 - Use After Free
- x ELF x64 - Remote Heap buffer overflow 2
- x ELF x64 - Advanced Heap Exploitation - Heap Leakless & Fortified
- x ELF x64 - Blind ROP
- x ELF x64 - Browser exploit - BitString
- x ELF ARM64 - Multithreading
0%
Cracking
0 Points0 / 66
- x ELF x86 - 0 protection
- x ELF x86 - Basique
- x PE x86 - 0 protection
- x ELF C++ - 0 protection
- x Godot - 0 protection
- x PE DotNet - 0 protection
- x APK - Introduction
- x ELF MIPS - Basic Crackme
- x ELF x64 - Golang basique
- x ELF x86 - Fake Instructions
- x ELF x86 - Ptrace
- x Godot - Bytecode
- x WASM - Introduction
- x APK - Flutter Debug
- x ELF ARM - Basic Crackme
- x ELF x64 - Basic KeygenMe
- x Gestion de sauvegarde sous Unity3D
- x Godot - Mono
- x PE DotNet - Basic Anti-Debug
- x PE DotNet - Basic Crackme
- x PYC - ByteCode
- x ELF x86 - Pas de points d’arrêt logiciels
- x Lua - Bytecode
- x MachO x64 - keygenme or not
- x ELF ARM - crackme 1337
- x ELF x86 - CrackPass
- x ELF x86 - ExploitMe
- x ELF x86 - Random Crackme
- x GB - Basic GameBoy crackme
- x PDF - Javascript
- x PE x86 - Xor Madness
- x Powershell DeObfuscation
- x ELF ARM - Crypted
- x ELF x64 - Automatisation du crackme
- x Godot - Modèle 3D
- x NRO ARM - Switch homebrew
- x PE x86 - SEHVEH
- x APK - Anti-debug
- x APK - Insomni’Droid
- x ELF x64 - Rust backdoor
- x ELF x64 - Rust Crackme
- x PE x64 - UEFI Secure Boot
- x APK - Root My Droid
- x ELF x64 - Nanomites - Introduction
- x ELF x86 - Anti-debug
- x PE DotNet - KeygenMe
- x PE x64 - Bazar dans les tables
- x PE x86 - AutoPE
- x PYC - Self Modifying (Byte)Code
- x PYC - Snakeygen
- x ELF x86 - KeygenMe
- x HackerMan
- x Unity - Mono - Basic Game Hacking
- x WASM - Trouvez le PNJ
- x Bash - VM
- x ELF x64 - KeyGenMe
- x ELF x64 - Anti-debug et equations
- x Unity - IL2CPP - Basic Game Hacking
- x ELF x64 - Nanomites
- x ELF x86 - Packed
- x PE x86 - RunPE
- x ELF x86 - VM
- x ELF x64 - Hidden Control Flow
- x Ringgit
- x Voracious Nanomites
- x White-Box Cryptography #2
0%
Cryptanalyse
0 Points0 / 70
- x Encodage - ASCII
- x Encodage - UU
- x Hash - DCC
- x Hash - DCC2
- x Hash - LM
- x Hash - Message Digest 5
- x Hash - NT
- x Hash - SHA-2
- x Chiffrement par décalage
- x CISCO - Salted Password
- x Décomposition pixelisée
- x ELF64 - Chiffrement avec le PID
- x Fichier - PKZIP
- x Substitution monoalphabétique - César
- x Circular Bit Shift
- x Clair connu - XOR
- x Code - Pseudo Random Number Generator
- x Encodage - Codebook
- x Fichier - PKZIP 2
- x File - Insecure storage 1
- x Substitution polyalphabétique - Vigenère
- x Système - Android lock pattern
- x Transposition - Rail Fence
- x AES - CBC - Bit-Flipping Attack
- x AES - ECB
- x AES - ECB - Copy Paste
- x LFSR - Clair connu
- x RSA - Factorisation
- x RSA - Oracle de déchiffrement
- x Service - Timing attack
- x Substitution monoalphabétique - Polybe
- x Twisted secret
- x Vecteur d’initialisation
- x Chiffre de Hill
- x GEDEFU
- x OTP - Erreur d’implémentation
- x RSA - Clé privée corrompue 1
- x RSA - Fractions continues
- x RSA - Modules communs
- x Service - Hash length extension attack
- x Shamir Secret Sharing - Introduction
- x AES - 4 tours
- x ECDSA - Introduction
- x RSA - Padding
- x RSA - Signature
- x Shamir Secret Sharing - Traitor
- x AES128 - CTR
- x PHP - mt_rand
- x Problème du logarithme discret
- x RSA - Clé privée corrompue 2
- x RSA - Clé privée corrompue 3
- x RSA - Multiples destinataires
- x AES - Attaque par fautes #1
- x FEAL - Cryptanalyse différentielle
- x Machine Enigma
- x Side Channel - AES : CPA
- x ECDHE
- x RSA - H-rabin
- x RSA - Lee cooper
- x Service - CBC Padding
- x Side Channel - AES : premier round
- x Substitution polyalphabétique - Masque jetable
- x White-Box Cryptography
- x AES - Variante affaiblie
- x Shamir Secret Sharing - Reduction
- x Hash - SHA-3
- x AES - Attaque par fautes #2
- x Shamir Secret Sharing - Irreductible ?
- x AES-PMAC
- x ECDSA - Erreur d’implémentation
9%
Forensic
50 Points4 / 44
- o Fichier supprimé
- o Capture moi ça
- o Command & Control - niveau 2
- o MasterKee
- x Oh My Grub
- x Docker layers
- x Windows - LDAP User KerbeRoastable
- x Windows - NTDS Extraction de secrets
- x Analyse de logs - attaque web
- x Command & Control - niveau 5
- x Supply chain attack - Docker
- x Trouvez le chat
- x Vilain petit canard
- x Windows - LDAP User ASRepRoastable
- x Active Directory - GPO
- x Command & Control - niveau 3
- x Exfiltration DNS
- x Open My Vault
- x Web3 - Mets ton masque - Etape 1
- x C2 Mythic
- x Command & Control - niveau 4
- x Entretien à l’ANSSI
- x Keylogger maison
- x macOS - Keychain
- x Macro Word malveillante
- x Ransomware Android
- x Supply chain attack - Python
- x Exfiltration air-gap
- x iOS - Introduction
- x The Artist
- x Multi-devices
- x Command & Control - niveau 6
- x Find me
- x Rootkit - Cold case
- x Second entretien à l’ANSSI
- x Web3 - Mets ton masque - Etape 2
- x Find me again
- x Find me back
- x Find me on Android
- x Zeus Bot
- x Try again
- x The Lost Case - Investigation Mobile
- x Remote Support
- x Try again 2
14%
Programmation
40 Points4 / 29
- o TCP - Retour au collège
- o TCP - Chaîne encodée
- o TCP - La roue romaine
- o TCP - Uncompress Me
- x CAPTCHA me if you can
- x Deep Learning - Introduction
- x Ethereum - Tutoreum
- x Suite mathématique
- x ELF x64 - Shellcoding - Sheep warmup
- x Ethereum - tx.origin
- x Solveur de polynômes du second degré
- x Ethereum - Takeover
- x Multiples encodages
- x Apprenti Scraper
- x ARM - Shellcoding - Egg hunter
- x Ethereum - Bunker
- x Ethereum - NotSoPriv8
- x Adversarial Attack - GAN
- x Deep Learning - Captcha
- x ELF x64 - Shellcoding - Polymorphism
- x Ethereum - Architecte
- x Ethereum - Reentrancy
- x Quick Response Code
- x WinKern x64 - shellcoding : vol de token
- x Ethereum - BadStack
- x ELF x64 - Sandbox shellcoding
- x Ethereum - King of the EVM
- x ELF x86 - Shellcoding - Alphanumeric
- x Adversarial Attack - Prison Break
0%
Réaliste
0 Points0 / 60
- x Eh oui, parfois
- x End Droid
- x Windows - KerbeRoast
- x ComCyber - Challenge
- x P0wn3d
- x Windows - ASRepRoast
- x Windows - Group Policy Preferences Passwords
- x The h@ckers l4b
- x Windows - ZeroLogon
- x Néonazi à l’intérieur
- x Windows - krbtgt history
- x Windows - sAMAccountName spoofing
- x Mersenne with 2
- x Bash/Awk - parsing netstat
- x Breaking Root-Me like it’s 2020
- x PyRat Enchères
- x Root them
- x IPBX - call me maybe
- x Marabout
- x Root-We
- x Starbug Bounty
- x Ultra Upload
- x Well-known
- x A bittersweet shellfony
- x Bash - System Disaster
- x Django unchained
- x Imagick
- x MALab
- x SSHocker
- x Web TV
- x DasBox1 : du Rififi chez les hommes-lézards
- x SamBox v2
- x SamCMS
- x BBQ Factory - First Flirt
- x Extractor
- x Getting root Over it !
- x reCOINier
- x Texode
- x BBQ Factory - Back To The Grill
- x Dans ton Kube
- x DjangocatZ
- x Red Pills
- x Root Me, for real
- x SamBox v1
- x SAP Pentest 007
- x Crypto Secure
- x Hôpital Bozobe
- x SamBox v3
- x ARM FTP Box
- x Bohemian RhapC2
- x I’m a Bl4ck H4t
- x SAP Pentest 000
- x Texode Back
- x Bluebox 2 - Pentest
- x Nodeful
- x Matrix terminal
- x Bluebox - Pentest
- x C comme C-curisé
- x Highway to shell
- x SamBox v4
0%
Réseau
0 Points0 / 33
- x FTP - Authentification
- x TELNET - authentification
- x ETHERNET - trame
- x Kerberos - Authentification
- x NTLM - Authentification
- x Authentification twitter
- x Bluetooth - Fichier inconnu
- x CISCO - mot de passe
- x DNS - transfert de zone
- x IP - Time To Live
- x LDAP - null bind
- x OSPF - Authentification
- x POP - APOP
- x RF - AM Transmission
- x Extraction de données
- x RF - FM Transmission
- x RF - Key Fixed Code
- x SIP - Authentification
- x ETHERNET - Transmission altérée
- x Trafic Global System for Mobile communications
- x HTTP - DNS Rebinding
- x SSL - échange HTTP
- x Netfilter - erreurs courantes
- x SNMP - Authentification
- x Wired Equivalent Privacy
- x Charge ICMP
- x ARP Spoofing - Écoute active
- x XMPP - Authentification
- x RF - Transmission satellite
- x WPA2 - Enterprise
- x ARP Spoofing - L’homme du milieu
- x RF - Bande L
- x WPA3 - SAE
9%
Stéganographie
30 Points2 / 23
- o EXIF - Metadata
- x Point à la ligne
- x Steganomobile
- x Twitter Secret Messages
- x TXT - George et Alfred
- x WAV - Analyse de bruit
- x Poem from Space
- x Points jaunes
- x EXIF - Miniature
- x Mimic - Dummy sight
- x WAV - Analyse spectrale
- o APNG - Just A PNG
- x Crypt-art
- x ELF x64 - Duality
- x PDF - Embedded
- x Genius ID
- x Kitty spy
- x PNG - Least Significant Bit
- x PNG - Pixel Indicator Technique
- x PNG - Pixel Value Differencing
- x Angecryption
- x Base Jumper
- x Hide and seek
0%
Web - Client
0 Points0 / 42
- x HTML - boutons désactivés
- x Javascript - Authentification
- x Javascript - Source
- x Javascript - Authentification 2
- x Javascript - Obfuscation 1
- x Javascript - Obfuscation 2
- x Javascript - Native code
- x Javascript - Webpack
- x Javascript - Obfuscation 3
- x XSS - Stockée 1
- x AST - Deobfuscation
- x CSP Bypass - Inline code
- x CSP Bypass - Nonce 2
- x CSRF - 0 protection
- x Web Socket - 0 protection
- x XSS DOM Based - Introduction
- x Flash - Authentification
- x XSS DOM Based - AngularJS
- x XSS DOM Based - Eval
- x CSP Bypass - Dangling markup
- x CSP Bypass - JSONP
- x CSRF - contournement de jeton
- x XSS - Volatile
- x CSP Bypass - Dangling markup 2
- x CSP Bypass - Nonce
- x CSS - Exfiltration
- x Javascript - Obfuscation 4
- x Relative Path Overwrite
- x XSS - Stockée 2
- x XSS DOM Based - Filters Bypass
- x Self XSS - DOM Secrets
- x CSPT - The Ruler
- x DOM Clobbering
- x Javascript - Obfuscation 6
- x Self XSS - Race Condition
- x Browser - bfcache / disk cache
- x HTTP Response Splitting
- x Javascript - Obfuscation 5
- x XS Leaks
- x XSS - Stored - contournement de filtres
- x XSS - DOM Based
- x Same Origin Method Execution
0%
Web - Serveur
0 Points0 / 96
- x HTML - Code source
- x HTTP - Contournement de filtrage IP
- x HTTP - Open redirect
- x HTTP - User-agent
- x Mot de passe faible
- x PHP - Injection de commande
- x API - Broken Access
- x Fichier de sauvegarde
- x HTTP - Directory indexing
- x HTTP - Headers
- x HTTP - POST
- x HTTP - Redirection invalide
- x HTTP - Verb tampering
- x Install files
- x Nginx - Alias Misconfiguration
- x Nginx - Root Location Misconfiguration
- x API - Mass Assignment
- x CRLF
- x File upload - Double extensions
- x File upload - Type MIME
- x Flask - Unsecure session
- x GraphQL - Introspection
- x HTTP - Cookies
- x Insecure Code Management
- x JWT - Introduction
- x XSS - Server Side
- x Directory traversal
- x File upload - Null byte
- x JWT - Jeton révoqué
- x JWT - Secret faible
- x JWT - Unsecure File Signature
- x PHP - assert()
- x PHP - Configuration Apache
- x PHP - Filters
- x PHP - Register globals
- x PHP - Remote Xdebug
- x Python - Server-side Template Injection Introduction
- x File upload - ZIP
- x Flask - Development server
- x GraphQL - Injection
- x Injection de commande - Contournement de filtre
- x Java - Server-side Template Injection
- x JWT - Clé publique
- x JWT - Header Injection
- x Local File Inclusion
- x Local File Inclusion - Double encoding
- x Nginx - SSRF Misconfiguration
- x Node - Eval
- x PHP - Loose Comparison
- x PHP - preg_replace()
- x PHP - Type juggling
- x Remote File Inclusion
- x SQL injection - Authentification
- x SQL injection - Authentification - GBK
- x SQL injection - String
- x XSLT - Exécution de code
- x Elixir - EEx
- x JWT - Unsecure Key Handling
- x LDAP injection - Authentification
- x Node - Serialize
- x NoSQL injection - Authentification
- x PHP - Path Truncation
- x PHP - Sérialisation
- x SQL injection - Numérique
- x SQL Injection - Routed
- x SQL Truncation
- x XML External Entity
- x XPath injection - Authentification
- x Yaml - Deserialization
- x API - Broken Access 2
- x GraphQL - Backend injection
- x GraphQL - Mutation
- x Java - Spring Boot
- x Local File Inclusion - Wrappers
- x PHP - Eval
- x PHP - Eval - Contournement de filtres avancés
- x SQL injection - Error
- x SQL injection - Insert
- x SQL injection - Lecture de fichiers
- x XPath injection - String
- x File upload - Polyglot
- x NodeJS - Prototype Pollution Bypass
- x NoSQL injection - En aveugle
- x SQL injection - Time based
- x Java - Custom gadget deserialisation
- x NodeJS - vm escape
- x Server Side Request Forgery
- x SQL injection - En aveugle
- x LDAP injection - En aveugle
- x PHP - Unserialize overflow
- x PHP - Unserialize Pop Chain
- x SQL Injection - Second Order
- x Python dotenv
- x Python - SSTI contournement de filtres en aveugle
- x XPath injection - En aveugle
- x SQL injection - Contournement de filtres