<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CTF on 0xMesbaha</title>
    <link>https://hussienmisbah.github.io/tags/ctf/</link>
    <description>Recent content in CTF on 0xMesbaha</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Wed, 28 May 2025 12:49:18 +0200</lastBuildDate>
    <atom:link href="https://hussienmisbah.github.io/tags/ctf/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>EGCERT-CTF JDBCLeak Exploit</title>
      <link>https://hussienmisbah.github.io/posts/code-review/2025-05-29-jdbcleak-egcert-finals/</link>
      <pubDate>Wed, 28 May 2025 12:49:18 +0200</pubDate>
      <guid>https://hussienmisbah.github.io/posts/code-review/2025-05-29-jdbcleak-egcert-finals/</guid>
      <description>&lt;p&gt;&lt;em&gt;JDBCLeak Leak was a challenge introducted in EGCERT CTF Finals 2025 under the category R&amp;amp;D , tbh i didn&amp;rsquo;t even look at the challenge during CTF Time , didn&amp;rsquo;t expect this category to introduce such good example of a real case code review challenge , however after reading the author&amp;rsquo;s blog &lt;a href=&#34;https://bitthebyte.medium.com/here-is-what-you-missed-during-the-egcert-ctf-2025-finals-927297143d9a&#34; target=&#34;_blank&#34; rel=&#34;noopener noreffer &#34;&gt;here&lt;/a&gt; about the category and challenge i thought of trying it myself and create a POC for it to get rce reading /flag.txt , we got 3rd place btw :&amp;ldquo;D&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>CyCTF 2024 Finals OSINT Writeups</title>
      <link>https://hussienmisbah.github.io/posts/osint/2024-11-30-cyctf-finals-osint-writeups/</link>
      <pubDate>Sat, 30 Nov 2024 12:49:18 +0200</pubDate>
      <guid>https://hussienmisbah.github.io/posts/osint/2024-11-30-cyctf-finals-osint-writeups/</guid>
      <description>&lt;p&gt;CyCTF is organized by &lt;a href=&#34;https://www.cyshield.com/&#34; target=&#34;_blank&#34; rel=&#34;noopener noreffer &#34;&gt;Cyshield&lt;/a&gt;&amp;rsquo;s cysec team every year , demonstrating new ideas and techniques in different categories (web exploitation , cryptography ,reverse and malware analysis , pwn , osint , mobile). it was my pleasure to be the author of SMS and vengeance challenges in web exploitation category and for the osint category in qualifcation and finals. this blog post will be about the solutions for the osint category in the finals round. My approach for creating the challenges was to not make it sherlock/yandex style ones and to introduce new ideas/techniques that can be used in real life scenarios.&lt;/p&gt;</description>
    </item>
    <item>
      <title>WizerCTF-May2024</title>
      <link>https://hussienmisbah.github.io/posts/code-review/2024-05-06-wizerctf-may-2024/</link>
      <pubDate>Sun, 05 May 2024 12:49:18 +0200</pubDate>
      <guid>https://hussienmisbah.github.io/posts/code-review/2024-05-06-wizerctf-may-2024/</guid>
      <description>&lt;p&gt;&lt;em&gt;Wizer CTF is an exciting game designed specifically for developers . It&amp;rsquo;s all about putting your skills to the test and seeing if you can identify and exploit vulnerabilities while honing your secure coding abilities. The game kicks off with a snappy code snippet that comes with some tricky vulnerabilities. Your goal? Spot those vulnerabilities and figure out how to exploit them.&#xA;The cool thing is that you don&amp;rsquo;t have to rely on guesswork to know if you&amp;rsquo;ve got it right. You can actually execute your payload right there on the game page. If you manage to successfully exploit the vulnerabilities, you&amp;rsquo;ll earn yourself a flag and a well-deserved spot on leaderboard , The main focus area is web exploitation and the ctf event is held every quarter , this writeup discusses 5 challenges out of 6.&lt;/em&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>JustCTF Extra Safe Security Layers writeup</title>
      <link>https://hussienmisbah.github.io/posts/web-exploitation/2023-06-04-justctf_extra-safe-security-layers/</link>
      <pubDate>Sun, 04 Jun 2023 12:49:18 +0200</pubDate>
      <guid>https://hussienmisbah.github.io/posts/web-exploitation/2023-06-04-justctf_extra-safe-security-layers/</guid>
      <description>&lt;p&gt;This Challenge is about exploiting cross site scripting with a strict CSP in place along with XSS Santizer and other restrictions , the interesting part in this blog is about learning the root cause and idenfiy exploit points. the challenge may seem very easy and it is easy and fun indeed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>meme generator challenge writeup</title>
      <link>https://hussienmisbah.github.io/posts/web-exploitation/2022-10-01-meme-generator/</link>
      <pubDate>Sat, 01 Oct 2022 12:49:18 +0200</pubDate>
      <guid>https://hussienmisbah.github.io/posts/web-exploitation/2022-10-01-meme-generator/</guid>
      <description>&lt;p&gt;This challenge was in Blackhat CTF Qualifications 2022 and we have participated under the team 0xCha0s, we have managed to solve multiple challenges. this challenge was ranked medium for 250 pts .&lt;/p&gt;</description>
    </item>
    <item>
      <title>kenzy challenge Writeup</title>
      <link>https://hussienmisbah.github.io/posts/web-exploitation/2022-08-06-kenzy/</link>
      <pubDate>Sat, 06 Aug 2022 12:49:18 +0200</pubDate>
      <guid>https://hussienmisbah.github.io/posts/web-exploitation/2022-08-06-kenzy/</guid>
      <description>&lt;p&gt;This Challenge is From Arab Security WarGames 2022 qualificatons , we managed to solve it intime and qualify to finals round.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Flushed Emoji challenge Writeup</title>
      <link>https://hussienmisbah.github.io/posts/web-exploitation/2022-07-25-flused-emoji/</link>
      <pubDate>Mon, 25 Jul 2022 12:49:18 +0200</pubDate>
      <guid>https://hussienmisbah.github.io/posts/web-exploitation/2022-07-25-flused-emoji/</guid>
      <description>&lt;p&gt;Lexington Informatics Tournament CTF CTF 2022 was held from the 22nd of July Until the 25th of the month , and we have participated under the team 0xcha0s, we have managed to solve multiple challenges. this challenge was solved less than 50 times in the 3 days and it was really nice.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Kryptos Support challenge Writeup</title>
      <link>https://hussienmisbah.github.io/posts/web-exploitation/2022-05-19-kryptos-support/</link>
      <pubDate>Thu, 19 May 2022 12:49:18 +0200</pubDate>
      <guid>https://hussienmisbah.github.io/posts/web-exploitation/2022-05-19-kryptos-support/</guid>
      <description>&lt;p&gt;HTB Cyber Apocalypse CTF 2022 was held from the 14th of May Until the 19th of the month , and we have participated under the team 0xcha0s, we have managed to solve multiple challenges. this challenge was ranked easy&lt;/p&gt;</description>
    </item>
    <item>
      <title>Hacker Ts challenge writeup</title>
      <link>https://hussienmisbah.github.io/posts/web-exploitation/2022-05-02-hacker-ts/</link>
      <pubDate>Mon, 02 May 2022 12:49:18 +0200</pubDate>
      <guid>https://hussienmisbah.github.io/posts/web-exploitation/2022-05-02-hacker-ts/</guid>
      <description>&lt;p&gt;Nahamcon ctf 2022 was held from the 28th of April Until the 30th of the month , and we have participated under the team 0xcha0s. this challenge idea was pretty new to me so it is helpful to document it in this writeup&lt;/p&gt;</description>
    </item>
    <item>
      <title>SQL Tutor challenge writeup</title>
      <link>https://hussienmisbah.github.io/posts/web-exploitation/2022-04-17-sql-tutor/</link>
      <pubDate>Sun, 17 Apr 2022 12:49:18 +0200</pubDate>
      <guid>https://hussienmisbah.github.io/posts/web-exploitation/2022-04-17-sql-tutor/</guid>
      <description>&lt;p&gt;DCTF 2022 was held from the 15th of April Until the 17th of the month , and we have participated under the team 0xcha0s, we have managed to solve multiple challenges. this challenge was ranked easy.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
