MCSC Blogs
Explore the world of cybersecurity through articles, tutorials, and insights from the MITS Cyber Security Club
Latest Articles
mcscCTF: Harappan Engineering Precision
2025-08-25 • Krishna Rajeev (@solvz)
A binary exploitation challenge combining information leaks with buffer overflow. Walk through the process of bypassing ASLR, calculating memory offsets, and hijacking program control flow to reach a hidden function.
mcscCTF: Imperial Gate
2025-08-25 • Athul Prakash NJ (@psychoSherlock)
A challenging web security exploit targeting Next.js middleware vulnerabilities. Discover how to bypass authentication using CVE-2025-29927 and special HTTP headers to access the sacred chamber.
mcscCTF: Ithihas
2025-08-25 • Athul Prakash NJ (@psychoSherlock)
A digital forensics challenge involving Git repository analysis. Discover hidden secrets by exploring commit history, branches, and understanding what lies beneath a seemingly simple blog project.
mcscCTF: Kushan Vault
2025-08-25 • Krishna Rajeev (@solvz)
A classic stack-based buffer overflow challenge. Learn how to bypass authentication through memory manipulation
mcscCTF: NotSoWiseBirbal
2025-08-25 • Athul Prakash NJ (@psychoSherlock)
A unique miscellaneous challenge combining riddle solving, Morse code, and Telegram bot interaction. Help restore Birbal's reputation by cracking cryptic puzzles and converting answers into audio signals.
mcscCTF: Project Azadi
2025-08-25 • Athul Prakash NJ (@psychoSherlock)
An Android security challenge involving APK decompilation and analysis. Uncover the encrypted oath of Azad's underground network by analyzing a recovered application and decoding hidden secrets.