All Blogs

Explore our collection of 9 articles on cybersecurity

Filter by Tag

mcscCTFPwnCTFWriteup

mcscCTF: Harappan Engineering Precision

2025-08-25Krishna Rajeev (@solvz)

A binary exploitation challenge combining information leaks with buffer overflow. Walk through the process of bypassing ASLR, calculating memory offsets, and hijacking program control flow to reach a hidden function.

Read More
mcscCTFWebCTFWriteup

mcscCTF: Imperial Gate

2025-08-25Athul Prakash NJ (@psychoSherlock)

A challenging web security exploit targeting Next.js middleware vulnerabilities. Discover how to bypass authentication using CVE-2025-29927 and special HTTP headers to access the sacred chamber.

Read More
mcscCTFForensicsCTFWriteup

mcscCTF: Ithihas

2025-08-25Athul Prakash NJ (@psychoSherlock)

A digital forensics challenge involving Git repository analysis. Discover hidden secrets by exploring commit history, branches, and understanding what lies beneath a seemingly simple blog project.

Read More
mcscCTFPwnCTFWriteup

mcscCTF: Kushan Vault

2025-08-25Krishna Rajeev (@solvz)

A classic stack-based buffer overflow challenge. Learn how to bypass authentication through memory manipulation

Read More
mcscCTFMiscellaneousCTFWriteup

mcscCTF: NotSoWiseBirbal

2025-08-25Athul Prakash NJ (@psychoSherlock)

A unique miscellaneous challenge combining riddle solving, Morse code, and Telegram bot interaction. Help restore Birbal's reputation by cracking cryptic puzzles and converting answers into audio signals.

Read More
mcscCTFAndroidCTFWriteup

mcscCTF: Project Azadi

2025-08-25Athul Prakash NJ (@psychoSherlock)

An Android security challenge involving APK decompilation and analysis. Uncover the encrypted oath of Azad's underground network by analyzing a recovered application and decoding hidden secrets.

Read More
mcscCTFCryptographyCTFWriteup

mcscCTF: The Maharaja's Secret Script

2025-08-25Krishna Rajeev (@solvz)

Break a substitution cipher through frequency analysis. This writeup demonstrates how to count character occurrences, rank them by frequency, and use statistical patterns to decrypt encoded text.

Read More
mcscCTFWebCTFWriteup

mcscCTF: TrustIssues

2025-08-25Athul Prakash NJ (@psychoSherlock)

A web security challenge exposing client-side vulnerabilities. Infiltrate an enemy portal by analyzing JavaScript code, discovering hardcoded credentials, and uncovering hidden console logs.

Read More
mcscCTFMiscellaneousCTFWriteup

mcscCTF: 😄😃😄😃😄

2025-08-25Athul Prakash NJ (@psychoSherlock)

A file metadata analysis challenge featuring an unusual emoji filename and mysterious extension. Discover the hidden secret by extracting EXIF data and investigating what lies beneath the surface.

Read More