AI Command Center - EotW CTF SS CASE IT 2025 Forensics Writeup

2025-05-27

Deep disk forensics analysis of an AI regime command center server - uncovering hidden partitions and encrypted secrets

#ctf#forensics#disk-analysis#sleuth-kit#file-carving#encryption#ss-case-it-2025

Algorithm Reversal - EotW CTF SS CASE IT 2025 Reverse Engineering Writeup

2025-05-27

Reverse engineering AI regime cipher verification systems to extract authentication algorithms and bypass security controls

#ctf#reverse-engineering#binary-analysis#gdb#ghidra#cipher-analysis#ss-case-it-2025

Binary Backdoor - EotW CTF SS CASE IT 2025 Reverse Engineering Writeup

2025-05-27

Discovering hardcoded backdoor credentials in AI regime security terminals through basic reverse engineering techniques

#ctf#reverse-engineering#strings#binary-analysis#backdoor#beginner#ss-case-it-2025

EotW CTF SS CASE IT 2025 - Binary Oracle Writeup

2025-05-27

Cracking the AI Regime's encryption service through XOR analysis and backdoor discovery. Learn how to interact with network services, understand binary encoding, and exploit XOR encryption vulnerabilities.

#cryptography#xor-encryption#network-services#binary-analysis#netcat#ctf#backdoor

EotW CTF SS CASE IT 2025 - Data Exfiltration Writeup

2025-05-27

Infiltrating the AI Regime's intelligence network through Server-Side Template Injection (SSTI) in a Flask application. Learn how to exploit Jinja2 templates to extract sensitive environment variables.

#web-security#ssti#template-injection#flask#jinja2#ctf#reconnaissance

Hidden Signal - EotW CTF SS CASE IT 2025 Steganography Writeup

2025-05-27

Extracting hidden messages from surveillance imagery using steganography techniques in the fight against the AI regime

#ctf#steganography#steghide#image-analysis#ss-case-it-2025

Intercepted Transmission - EotW CTF SS CASE IT 2025 Forensics Writeup

2025-05-27

Analyzing corrupted AI regime communications to extract hidden intelligence from intercepted data transmissions

#ctf#forensics#file-analysis#strings#hex-analysis#data-extraction#ss-case-it-2025

EotW CTF SS CASE IT 2025 - Liberation Binary Writeup

2025-05-27

A classic buffer overflow exploitation challenge featuring the AI regime resistance theme. Learn how to bypass authentication and access the resistance mainframe through stack-based buffer overflow.

#pwn#buffer-overflow#binary-exploitation#ctf#stack#gets-vulnerability

Memory Remnants - EotW CTF SS CASE IT 2025 Memory Forensics Writeup

2025-05-27

Analyzing AI surveillance drone memory dumps to extract authentication credentials and intelligence from volatile memory

#ctf#memory-forensics#strings#base64#binwalk#data-extraction#ss-case-it-2025

Network Intercept - EotW CTF SS CASE IT 2025 Network Forensics Writeup

2025-05-27

Analyzing fragmented network traffic to reconstruct distributed authentication tokens across multiple protocols and encoding schemes

#ctf#network-forensics#wireshark#pcap-analysis#base64#base32#xor#ss-case-it-2025