- Levels
- Writeups
- Level 1 - All Walkthroughs
- Find the unencrypted API key
- Find the HTTP-BasicAuth formatted username and password
- Find the CTF information block
- Find the encrypted API key
- Crack the first login system
- Modify the variable of the hide menu functionality
- Authentication Server Investigation
- Security Systems In This CTF
- Pseudocode representation of the login system
- Find the integer based key used to compare the input license in the GUI.
- Figure out where the pre-determined login statement is being made.
- Find the hotkey that is used to exit the menu and kill the current process
- Bypass entirely - login system
- Level 2 - All Walkthroughs
- Objectives you need to complete
- Locating The Thread Management Calls
- Section 1.0 (Binary Integrity System)
- Section 2.0 (Security & Binary Protections)
- Section 3.0 (Data & Information)
- Section 4.0 (Beeps and Kinks)
- Section 5.0 (Vulnerabilities & Binary Auditing)
- Section 6.0 (Networking & Web)
- Locating The Server Routine
- Server port
- Server folder for local file hosting
- Endpoints for login
- Binary Auditing - 6.4.0
- Static Key Generation
- Remote location of the logo
- Analyzing Binding & Server Routines
- Analyzing JS To Find Web Vulnerabilities
- Section 7.0 (Exploit Development)
- Section 0x0 - Tips and Information
- Level 3 - All Walkthroughs
- Level Exploits / Scripts
- REplay - Exploring Further
- REplay - Suggested Resources For RE
- REplay - L1-3 Goal Pages
- Level 1 - All Walkthroughs
- REplay - Extras
- Finished!