NUS Greyhats at CDDC 2015 and (Almost) Epic Mass Exploitation
The Cyber Defenders Discovery Camp 2015 is an introductory computer security workshop slash competition targeted at students at the JC and IHL levels. This i...
The Cyber Defenders Discovery Camp 2015 is an introductory computer security workshop slash competition targeted at students at the JC and IHL levels. This i...
Steal the password and TOTP token from an admin using cross-site scripting.
Remote code execution in a seccomp protected python service requiring manipulating python internals to retrieve the flag in memory.
Remote code execution with a code injection vulnerability in a Forth interpreter.
Analyse a given PCAP for some secret communication between Alice and Bob and determine which messages contain a valid signature.
Directory contents are hidden with a mount.
Execute arbitrary non-alphanumeric ruby code with length limitations.
An off-by-one error allows an attacker to leak return codes from memcmp to determine the difference in the supplied byte and the compared byte to leak the fl...