All Blogs
Explore our collection of 9 articles on cybersecurity
Filter by Tag
mcscCTF: Harappan Engineering Precision
2025-08-25 • Krishna Rajeev (@solvz)
A binary exploitation challenge combining information leaks with buffer overflow. Walk through the process of bypassing ASLR, calculating memory offsets, and hijacking program control flow to reach a hidden function.
mcscCTF: Imperial Gate
2025-08-25 • Athul Prakash NJ (@psychoSherlock)
A challenging web security exploit targeting Next.js middleware vulnerabilities. Discover how to bypass authentication using CVE-2025-29927 and special HTTP headers to access the sacred chamber.
mcscCTF: Ithihas
2025-08-25 • Athul Prakash NJ (@psychoSherlock)
A digital forensics challenge involving Git repository analysis. Discover hidden secrets by exploring commit history, branches, and understanding what lies beneath a seemingly simple blog project.
mcscCTF: Kushan Vault
2025-08-25 • Krishna Rajeev (@solvz)
A classic stack-based buffer overflow challenge. Learn how to bypass authentication through memory manipulation
mcscCTF: NotSoWiseBirbal
2025-08-25 • Athul Prakash NJ (@psychoSherlock)
A unique miscellaneous challenge combining riddle solving, Morse code, and Telegram bot interaction. Help restore Birbal's reputation by cracking cryptic puzzles and converting answers into audio signals.
mcscCTF: Project Azadi
2025-08-25 • Athul Prakash NJ (@psychoSherlock)
An Android security challenge involving APK decompilation and analysis. Uncover the encrypted oath of Azad's underground network by analyzing a recovered application and decoding hidden secrets.
mcscCTF: The Maharaja's Secret Script
2025-08-25 • Krishna Rajeev (@solvz)
Break a substitution cipher through frequency analysis. This writeup demonstrates how to count character occurrences, rank them by frequency, and use statistical patterns to decrypt encoded text.
mcscCTF: TrustIssues
2025-08-25 • Athul Prakash NJ (@psychoSherlock)
A web security challenge exposing client-side vulnerabilities. Infiltrate an enemy portal by analyzing JavaScript code, discovering hardcoded credentials, and uncovering hidden console logs.
mcscCTF: 😄😃😄😃😄
2025-08-25 • Athul Prakash NJ (@psychoSherlock)
A file metadata analysis challenge featuring an unusual emoji filename and mysterious extension. Discover the hidden secret by extracting EXIF data and investigating what lies beneath the surface.