mjuuum
15
Place19875
Points515
Challenges56
Compromissions
97%
App - Script
900 Points32 / 33
- o Bash - System 1
- o sudo - faiblesse de configuration
- o Bash - System 2
- o LaTeX - Input
- o Powershell - Command injection
- o AppArmor - Jail Introduction
- o Bash - unquoted expression injection
- o Docker - I am groot
- o Perl - Command injection
- o Powershell - SecureString
- o Bash - cron
- o LaTeX - Execution de commandes
- o Python - input()
- o R : exécution de code
- o Powershell - Basic jail
- o Python - pickle
- o Bash - quoted expression injection
- o Docker - Sys-Admin’s Docker
- o Shared Objects hijacking
- o SSH - Agent Hijacking
- o AppArmor - Jail Medium
- o Bash - race condition
- o Docker - Talk through me
- o Python - format string
- o Python - PyJail 1
- o PHP - Jail
- o Python - PyJail 2
- o Python - Jail - Exec
- o Javascript - Jail
- o Python - Jail - Garbage collector
- o Bash - Shells restreints
- o Python - Eval Is Evil
- x Deep learning - Modèle malveillant
59%
App - Système
3360 Points55 / 93
- o ELF x86 - Stack buffer overflow basic 1
- o ELF x64 - Basic heap overflow
- o ELF x86 - Stack buffer overflow basic 2
- o PE32 - Stack buffer overflow basic
- o ELF x86 - Format string bug basic 1
- o ELF x64 - Stack buffer overflow - basic
- o ELF x86 - Format string bug basic 2
- o ELF x86 - Race condition
- o ELF ARM - Stack buffer overflow - basic
- o ELF MIPS - Stack buffer overflow - No NX
- o ELF x64 - Double free
- o ELF x86 - Stack buffer overflow basic 3
- o ELF x86 - Use After Free - basic
- o ELF ARM - Stack Spraying
- o ELF x64 - Stack buffer overflow - PIE
- o ELF x86 - BSS buffer overflow
- o ELF x86 - Stack buffer overflow basic 4
- o ELF x86 - Stack buffer overflow basic 6
- o ELF x86 - Format String Bug Basic 3
- o PE32 - Stack buffer overflow avancé
- o ELF ARM - Basic ROP
- o ELF MIPS - Basic ROP
- o ELF RISC-V - Intro - let’s do the ROP
- x ELF x64 - Stack buffer overflow - Stack pivot
- o ELF x86 - Stack buffer overflow - C++ vtables
- o PE32+ Format string bug
- o ELF x64 - Logic bug
- x ELF x86 - Bug Hunting - Plusieurs problèmes
- o ELF x86 - Stack buffer and integer overflow
- o ELF x86 - Stack buffer overflow - ret2dl_resolve
- o ELF x86 - Stack buffer overflow basic 5
- o ELF x64 - Stack buffer overflow - avancé
- o ELF MIPS - Format String Glitch
- x ELF x64 - Heap Filling
- o ELF x86 - Information leakage with Stack Smashing Protector
- x ELF x64 - File Structure Hacking
- x ELF ARM - Race condition
- x ELF x64 - Browser exploit - Intro
- x ELF x64 - Buggy VM
- x ELF x64 - Heap Safe-Linking Bypass
- x ELF x64 - ret2dl_init
- o ELF x86 - Out of bounds attack - French Paradox
- o ELF x86 - Remote BSS buffer overflow
- o ELF x86 - Remote Format String bug
- o PE32+ Basic ROP
- o ELF x64 - Remote heap buffer overflow - tcache
- o ELF x86 - Blind remote format string bug
- x LinKern ARM - syscall vulnérable
- x LinKern x86 - Buffer overflow basic 1
- o ELF x64 - Sigreturn Oriented Programming
- x LinKern x86 - Null pointer dereference
- x ELF x64 - Syscall chaining
- x LinKern x64 - Race condition
- x ELF ARM - Shellcode alphanumérique
- x ELF MIPS - URLEncoded Format String bug
- x ELF x64 - Blind SROP
- x ELF x64 - Heap Hop
- o ELF x86 - Hardened binary 1
- o ELF x86 - Hardened binary 2
- o ELF x86 - Hardened binary 3
- o ELF x86 - Hardened binary 4
- x LinKern MIPSel - Vulnerable ioctl
- x LinKern x64 - code réentrant
- o ELF ARM - Heap format string bug
- o ELF ARM - Format String bug
- o ELF ARM - Use After Free
- x ELF x64 - FILE structure hijacking
- x ELF x64 - Heap feng-shui
- o ELF x64 - Off-by-one bug
- o ELF x86 - Hardened binary 5
- x LinKern ARM - Stack Overflow
- x LinKern x86 - basic ROP
- x ELF ARM - Heap Off-by-One
- x ELF x64 - Advanced blind format string exploitation
- o ELF x64 - Remote Heap buffer overflow 1
- o ELF x86 - Hardened binary 6
- o ELF x86 - Hardened binary 7
- o ELF x86 - Remote stack buffer overflow - Hardened
- x LinKern x64 - RowHammer
- x LinKern x64 - SLUB off-by-one
- x ELF ARM - Heap buffer overflow - Wilderness
- x ELF ARM - Heap Overflow
- x ELF ARM64 - Heap Underflow
- o ELF x64 - Seccomp Whitelist
- o ELF x86 - Blind ROP
- x LinKern x64 - Memory exploration
- x WinKern x64 - Stack buffer overflow avancé - ROP
- x WinKern x64 - Use After Free
- x ELF x64 - Remote Heap buffer overflow 2
- x ELF x64 - Advanced Heap Exploitation - Heap Leakless & Fortified
- o ELF x64 - Blind ROP
- x ELF x64 - Browser exploit - BitString
- x ELF ARM64 - Multithreading
94%
Cracking
2235 Points62 / 66
- o ELF x86 - 0 protection
- o ELF x86 - Basique
- o PE x86 - 0 protection
- o ELF C++ - 0 protection
- o Godot - 0 protection
- o PE DotNet - 0 protection
- o APK - Introduction
- o ELF MIPS - Basic Crackme
- o ELF x64 - Golang basique
- o ELF x86 - Fake Instructions
- o ELF x86 - Ptrace
- o Godot - Bytecode
- o WASM - Introduction
- o APK - Flutter Debug
- o ELF ARM - Basic Crackme
- o ELF x64 - Basic KeygenMe
- o Gestion de sauvegarde sous Unity3D
- o Godot - Mono
- o PE DotNet - Basic Anti-Debug
- o PE DotNet - Basic Crackme
- o PYC - ByteCode
- o ELF x86 - Pas de points d’arrêt logiciels
- o Lua - Bytecode
- o MachO x64 - keygenme or not
- o ELF ARM - crackme 1337
- o ELF x86 - CrackPass
- o ELF x86 - ExploitMe
- o ELF x86 - Random Crackme
- o GB - Basic GameBoy crackme
- o PDF - Javascript
- o PE x86 - Xor Madness
- o Powershell DeObfuscation
- o ELF ARM - Crypted
- o ELF x64 - Automatisation du crackme
- o Godot - Modèle 3D
- o NRO ARM - Switch homebrew
- o PE x86 - SEHVEH
- o APK - Anti-debug
- o APK - Insomni’Droid
- o ELF x64 - Rust backdoor
- o ELF x64 - Rust Crackme
- o PE x64 - UEFI Secure Boot
- o APK - Root My Droid
- o ELF x64 - Nanomites - Introduction
- o ELF x86 - Anti-debug
- o PE DotNet - KeygenMe
- x PE x64 - Bazar dans les tables
- o PE x86 - AutoPE
- x PYC - Self Modifying (Byte)Code
- o PYC - Snakeygen
- o ELF x86 - KeygenMe
- o HackerMan
- o Unity - Mono - Basic Game Hacking
- o WASM - Trouvez le PNJ
- o Bash - VM
- o ELF x64 - KeyGenMe
- o ELF x64 - Anti-debug et equations
- o Unity - IL2CPP - Basic Game Hacking
- o ELF x64 - Nanomites
- o ELF x86 - Packed
- o PE x86 - RunPE
- o ELF x86 - VM
- o ELF x64 - Hidden Control Flow
- o Ringgit
- x Voracious Nanomites
- x White-Box Cryptography #2
83%
Cryptanalyse
1915 Points62 / 75
- o Encodage - ASCII
- o Encodage - UU
- o Hash - DCC
- o Hash - DCC2
- o Hash - LM
- o Hash - Message Digest 5
- o Hash - NT
- o Hash - SHA-2
- o Chiffrement par décalage
- o CISCO - Salted Password
- o Décomposition pixelisée
- o ELF64 - Chiffrement avec le PID
- o Fichier - PKZIP
- o Substitution monoalphabétique - César
- o Circular Bit Shift
- o Clair connu - XOR
- o Code - Pseudo Random Number Generator
- o Encodage - Codebook
- x Fichier - PKZIP 2
- o File - Insecure storage 1
- o Substitution polyalphabétique - Vigenère
- o Système - Android lock pattern
- o Transposition - Rail Fence
- o AES - CBC - Bit-Flipping Attack
- o AES - ECB
- x AES - ECB - Copy Paste
- x DSA - Erreur d’implémentation
- o LFSR - Clair connu
- o RSA - Factorisation
- o RSA - Oracle de déchiffrement
- o Service - Timing attack
- o Substitution monoalphabétique - Polybe
- o Twisted secret
- o Vecteur d’initialisation
- o Chiffre de Hill
- o GEDEFU
- o OTP - Erreur d’implémentation
- o RSA - Clé privée corrompue 1
- o RSA - Fractions continues
- o RSA - Modules communs
- o Service - Hash length extension attack
- o Shamir Secret Sharing - Introduction
- o AES - 4 tours
- o ECDSA - Introduction
- x ElGamal - Attaque par fautes (Introduction)
- o RSA - Padding
- o RSA - Signature
- x Shamir Secret Sharing - Traitor
- o AES128 - CTR
- o PHP - mt_rand
- o Problème du logarithme discret
- o RSA - Clé privée corrompue 2
- o RSA - Clé privée corrompue 3
- o RSA - Multiples destinataires
- o AES - Attaque par fautes #1
- x FEAL - Cryptanalyse différentielle
- x Goldreich Goldwasser Halevi | Weak Parameter
- o Machine Enigma
- o Side Channel - AES : CPA
- o ECDHE
- x NTRU | Multiple Transmission
- x NTRU | Weak Parameter
- o RSA - H-rabin
- o RSA - Lee cooper
- o Service - CBC Padding
- o Side Channel - AES : premier round
- o Substitution polyalphabétique - Masque jetable
- o White-Box Cryptography
- o AES - Variante affaiblie
- o Shamir Secret Sharing - Reduction
- x Hash - SHA-3
- o AES - Attaque par fautes #2
- x Shamir Secret Sharing - Irreductible ?
- x AES-PMAC
- x ECDSA - Erreur d’implémentation