Skip to content

Instantly share code, notes, and snippets.

View ky28059's full-sized avatar
πŸ₯°

Kevin Yu ky28059

πŸ₯°
View GitHub Profile

Hack the Madness CTF Round 2 β€” broken production

Our PHP devs are working on this employee management portal. We have a mock build of the website and you are to pentest the platform for weaknesses. Your goal is to get more privileges and command execution on the server.

We're given a PHP server that looks like this:

<?php
spl_autoload_register(function ($name){
    if (preg_match('/Controller$/', $name))
    {
        $name = "controllers/${name}";

PwnMe CTF Quals 2025 β€” Hack the bot 1

I've developed a little application to help me with my pentest missions, with lots of useful payloads! I even let users add new payloads, but since I was in a rush I didn't have time to test the security of my application, could you take care of it ?

We're given an express server that looks like this:

const express = require('express');
const path = require('path');
const fs = require('fs');
const { spawn } = require('child_process');
const puppeteer = require('puppeteer');

m0leCon Beginner CTF 2024 β€” PIETcture

Paint by Numbers? Or perhaps, compute by pixels?

We're given an image that looks like this:

PIETcture

Based on the challenge name, this is a program written in the esolang Piet. Then, we can import the program into an online Piet IDE and try running it:

LakeCTF '24-'25 Quals β€” VerySusOrganization

You have been hired to contribute to a very suspicious project. Follow the link below to get onboard.

https://challs.polygl0ts.ch:8123

We're given access to an organization that looks like this:

image

Besides the random projects, of note are two repositories:

1337UP LIVE CTF 2024 β€” Private Github Repository

Bob Robizillo created a public instructions for Tiffany, so she can start work on new secret project. can you access the secret repository?

We're not given a whole lot to work with. Howver, googling "Bob Robizillo" nets us this public Gist:

image

Dear Tiffany,

I hope this message finds you well. To streamline our collaboration on the 1337up repository, I kindly ask you to add the enclosed SSH key to your account. This step is crucial for enabling a seamless forking process and enhancing our project efficiency.

1337UP LIVE CTF 2024 β€” Pizza Paradise

Something weird going on at this pizza store!!

https://pizzaparadise.ctf.intigriti.io

We're given a simple pizza chain website looking like this:

image

Looking at the source code, CSS, and images, nothing seems out of the ordinary. However, going to robots.txt,

1337UP LIVE CTF 2024 β€” Trackdown

There's a fugitive on the loose and we need to track him down! He posted this to social media recently, do you know where the photograph was taken from? If you can provide the precise building, we can move in immediately πŸš”

We're given an image that looks like this:

trackdown

Should be simple, right? In the middle of the image, we find a reference to the "Trang Tien Plaza" bringing us right here:

image

DEADFACE CTF 2024 β€” Target List 1

Deadface is running a server where they have a list of targets they are planning on using in an upcoming attack. See if you can find any targets they are trying to hide.

http://targetlist.deadface.io:3001

We're given a simple website that looks like this:

image

On each "page", we can find records that begin with "A", "B", and "C":

BuckeyeCTF 2024 β€” dojo

The dojo stores many riches. Can you make it through the gauntlet?

dojo.challs.pwnoh.io

We're given a Go server looking like this:

package server

import (