All Blogs
Explore our collection of 12 articles on cybersecurity
Filter by Tag
Eschaton CTF 2026: Campus Link
2026-02-20 • Athul Prakash NJ (@psychoSherlock)
A web exploitation challenge involving host header injection, SSRF, and a blind XSS attack to manipulate an admin panel and change student grades. Walk through the process of discovering internal services, bypassing CSP restrictions, and automating form submissions to achieve the desired outcome.
Eschaton CTF 2026: Get Me A Ticket
2026-02-20 • Athul Prakash NJ (@psychoSherlock)
A writeup for the 'Get Me A Ticket' challenge from Eschaton CTF 2026, involving a critical SQL injection vulnerability in Django and a race condition in coupon redemption logic.
Eschaton CTF 2026: TragicRoll
2026-02-20 • Athul Prakash NJ (@psychoSherlock)
A writeup for the 'TragicRoll' challenge from Eschaton CTF 2026, involving a vulnerability in OpenGraph metadata to execute arbitrary commands via ImageMagick's processing of preview images.
mcscCTF: Harappan Engineering Precision
2025-08-25 • Krishna Rajeev (@solvz)
A binary exploitation challenge combining information leaks with buffer overflow. Walk through the process of bypassing ASLR, calculating memory offsets, and hijacking program control flow to reach a hidden function.
mcscCTF: Imperial Gate
2025-08-25 • Athul Prakash NJ (@psychoSherlock)
A challenging web security exploit targeting Next.js middleware vulnerabilities. Discover how to bypass authentication using CVE-2025-29927 and special HTTP headers to access the sacred chamber.
mcscCTF: Ithihas
2025-08-25 • Athul Prakash NJ (@psychoSherlock)
A digital forensics challenge involving Git repository analysis. Discover hidden secrets by exploring commit history, branches, and understanding what lies beneath a seemingly simple blog project.
mcscCTF: Kushan Vault
2025-08-25 • Krishna Rajeev (@solvz)
A classic stack-based buffer overflow challenge. Learn how to bypass authentication through memory manipulation
mcscCTF: NotSoWiseBirbal
2025-08-25 • Athul Prakash NJ (@psychoSherlock)
A unique miscellaneous challenge combining riddle solving, Morse code, and Telegram bot interaction. Help restore Birbal's reputation by cracking cryptic puzzles and converting answers into audio signals.
mcscCTF: Project Azadi
2025-08-25 • Athul Prakash NJ (@psychoSherlock)
An Android security challenge involving APK decompilation and analysis. Uncover the encrypted oath of Azad's underground network by analyzing a recovered application and decoding hidden secrets.
mcscCTF: The Maharaja's Secret Script
2025-08-25 • Krishna Rajeev (@solvz)
Break a substitution cipher through frequency analysis. This writeup demonstrates how to count character occurrences, rank them by frequency, and use statistical patterns to decrypt encoded text.
mcscCTF: TrustIssues
2025-08-25 • Athul Prakash NJ (@psychoSherlock)
A web security challenge exposing client-side vulnerabilities. Infiltrate an enemy portal by analyzing JavaScript code, discovering hardcoded credentials, and uncovering hidden console logs.
mcscCTF: 😄😃😄😃😄
2025-08-25 • Athul Prakash NJ (@psychoSherlock)
A file metadata analysis challenge featuring an unusual emoji filename and mysterious extension. Discover the hidden secret by extracting EXIF data and investigating what lies beneath the surface.