The objective of the Sussy Disk 4 CTF challenge is to unzip a password-protected zip file and retrieve the flag.
The objective of the Sussy Disk 5 CTF challenge is to find the flag through various hidden artifacts across the disk
The objective of the Zelda Phishing Pond CTF challenge is to analyze a phishing email and extract the flag from encoded contents.
Analyze the Apache log file to uncover and decode suspicious data.
Decode the flag from a given set of arrays using missing numbers.
Answer five questions based on the provided authentication logs.
Exploit a vulnerability to retrieve information about other users, including the flag.
Exploit a Local File Inclusion (LFI) vulnerability to retrieve the flag.
A writeup of the cryptography challenge KeepJohn from FSIIECTF 2024. The challenge required using Munger to guess passwords.