menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Security News

>

💀 Insomni...
source image

Dev

4w

read

0

img
dot

Image Credit: Dev

💀 Insomni'hack 2025 CTF write-up

  • The Insomni'hack 2025 CTF took place during the Insomni'hack conference in Lausanne, Switzerland, with challenges ranging from easy to complex.
  • A participant shared their experience as a beginner focusing on easy challenges due to time constraints and fatigue.
  • In one of the challenges 'Welcome To Insomni'hack', participants had to clone a repository, encountering suspicious commands in the package.json file.
  • By analyzing the scripts, participants discovered encoded flags leading to successful completions of the challenge.
  • Another challenge 'v0l4til3' involved memory analysis using Volatility to extract hash values and solve a flag-related task.
  • A SQL injection vulnerability in the 'Crack the gate' challenge allowed participants to bypass authentication and obtain the flag.
  • In the 'EG101' challenge, a crypto puzzle required decoding data and exploiting cryptographic operations to reveal the flag.
  • Participants exploited LFI vulnerabilities in the 'Hawkta' challenge by manipulating parameters to access sensitive files and retrieve the flag.
  • Overall, the Insomni'hack 2025 CTF offered a variety of challenges that tested participants' skills in cybersecurity and problem-solving.

Read Full Article

like

Like

For uninterrupted reading, download the app