Code of The Day

Cyber Security, Software Engineering, and sometimes, Life

  • HTB Boxes
  • CTF
  • Security
  • MA/RE
  • Engineering
  • Book Review
  • Life
  • LinkedIn
  • GitHub
  • Red Team Blue Team

    Although my work revolves around Blue Team research such as attack detection and defense mechanisms, I have been learning and studying a lot on Red Team techniques which for now mostly consists of Web Attacks. Knowing more about the attack techniques, surface, privilege escalation, lateral movement and many others have given me a much broader […]

    Chan Jin Hao

    September 13, 2022
    Uncategorized
  • Four Thousand Weeks

    A book by Oliver Burkeman. The premise is that we all have roughly 4000 weeks to live, and that we should savor every moment, instead of constantly worrying about the future. That’s not to say that we should disregard future problems like climate change and perhaps more personal matters like family planning and health. Instead […]

    Chan Jin Hao

    August 8, 2022
    Book Review
  • Think Again

    Summary points on the book Think Again by Adam Grant Treat your opinions as a hypothesis instead of a fact, and be prepared for your hypothesis to be refuted Identify yourself with values, not opinions Actively seek out conflicting views points to your opinions Don’t confuse competence with confidence Enjoy being wrong Learn something new […]

    Chan Jin Hao

    July 14, 2022
    Book Review
  • UA CSW CTF 2022 Write Up Dump

    Dump of some solutions for this beginner friendly CTF. It was relatively easy compared to others. Web Penguim – (De)Serial Killer Login page Homepage Weird looking cookie Path Traversal in picture_path Flag is rendered as base64 Missing Out Source. Immediately looking at werkzeug console exploit. Since the app.log is in the same folder and the […]

    Chan Jin Hao

    May 27, 2022
    CTF
  • HTB Cyber Apocalypse Forensics

    Dump of the 3 Forensics challenge that I solved Generally for Windows forensics, I like to use Autopsy, which is a brilliant tool to extract dat artifacts from a wide variety of inputs Puppeteer We import all the logs files into Autopsy as Logical Files Select all the ingest modules to run, which analyses the […]

    Chan Jin Hao

    May 21, 2022
    CTF
  • Angstrom Rev Writeups

    I’ve decided to fully focus on Rev and Web for CTFs now, as I find Pwning too magical, and not really “useful” to me. Anyhoo, here are some reversing writeups from Angstrom CTF! Dyn Running the code, we see that it gets the flag as an input Stepping through the code, it tries to unwrap 32 characters, […]

    Chan Jin Hao

    May 6, 2022
    CTF
  • 247CTF

    Here are some writeups for 247CTF, which are mostly web challenges. ACID We’re given a page that has two accounts. You can transfer funds between the two accounts with the parameter ?to=1&from=2&amount=1 To get the flag, you require more than the total available funds at the start, which is 247. If we transfer the funds […]

    Chan Jin Hao

    April 24, 2022
    CTF
  • Midnight Sun CTF Gambler

    This is one of the hardest CTF I’ve been in. My team did really well to qualify for the finals in Sweden, and I wish them all the best as I will not be joining them. The Gambler This was a DotNet binary, we so could use DNSpy to inspect the full source code In […]

    Chan Jin Hao

    April 12, 2022
    CTF
  • Winja CTF Reverse Engineering

    Honestly, this was a very easy CTF rev challenge. One of them had a flaw with there being more than 1 possible flag, while another was straight out leaking the whole flag with ltrace. So this is the only writeup worth writing, even though it was extremely easy Matriarcado Opening the binary, we see that […]

    Chan Jin Hao

    April 12, 2022
    CTF
  • WolvSec CTF: pwning canaries

    Another writeup for a pwn CTF challenge! In this challenge, we need to leak the canary value via format strings, and do a buffer overflow to change the return address to the desired function. The buffer for us to overflow is 16 characters long. It first reads in data with a format string, and prints […]

    Chan Jin Hao

    March 29, 2022
    CTF, Hacking
1 2 3 … 14
Next Page

Proudly Powered by WordPress

  • Follow Following
    • Code of The Day
    • Join 28 other followers
    • Already have a WordPress.com account? Log in now.
    • Code of The Day
    • Edit Site
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar