The Cyber Defenders Discovery Camp 2015 is an introductory computer security workshop slash competition targeted at students at the JC and IHL levels. This i...
Use the Boneh-Durfee attack on low private exponents to recover the original two prime factors comprising the private key and decrypt an encrypted flag.
Recover the IV of an AES operation by utilising imperfect knowledge of the key and encrypted output.
Fake a valid cake object containing arbitrary ingredients to a bakery service by modifying decompiled Java bytecode and resigning the JAR with spoofed creden...
A troll challenge that required you to transcribe a melody on a hidden area of the website.
Dystopian Narwhals participated in PoliCTF 2015, and it was a lot of fun. The challenges were challenging, yet engaging and we ended up with a score of 1258 ...
Simulated shell environment lets you pretend to be Hugh Jackman in Swordfish.
Remote prolog application to solve the Tower of Hanoi problem is vulnerable to remote code execution by injecting Prolog code.