Detailed walkthroughs of challenges I've solved. This is where I apply my skills and learn new techniques.
LakeCTF 2025 - packet analysis
network analysis
100 Points
At this challenge i found my self in front of packets not just normal and the known packets this time with packets captured during a phone messaging through 5G SMS, and the description says What are these SMS I received as soon as I connected to the gNB?. to answer this question you need to understand the protocols gNB--the base station-- uses to connect UE(user equipement/client) with the 5G core network. and here is a walkthrough this.
SQLi
WAF Bypass
Burp Suite
Read Full Writeup
HTB Cyber Apocalypse 2022 - Gatekeeper
May 2022
Forensics
Easy
A PCAP file was provided containing network traffic from a suspicious device. By analyzing the traffic with Wireshark and `tshark`, I discovered a series of ICMP packets with data hidden in the payload (a covert channel). Extracting and reassembling this data revealed a zip file password, which unlocked the flag.
PCAP Analysis
Wireshark
Covert Channel
tshark
Read Full Writeup
DEF CON CTF Quals 2021 - realworld-sigpwn
May 2021
Hardware / IoT
Medium
This challenge provided a firmware image for an IoT device. Using Binwalk, I extracted the file system and found a custom binary. By reverse engineering the binary with Ghidra, I identified a hardcoded backdoor password in the firmware's telnet service, which allowed me to log in and read the flag file.
Firmware Analysis
Reverse Engineering
Ghidra
Binwalk
Read Full Writeup