<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>All Write-ups - The handbag of Cryptax</title><link>https://cryptax.github.io/writeups/</link><description>All Write-ups | The handbag of Cryptax</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><managingEditor>crypto.maniak@gmail.com (Cryptax)</managingEditor><webMaster>crypto.maniak@gmail.com (Cryptax)</webMaster><lastBuildDate>Tue, 13 Jan 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://cryptax.github.io/writeups/" rel="self" type="application/rss+xml"/><item><title>OSINT Industries Christmas 2025 CTF</title><link>https://cryptax.github.io/osindus2025/</link><pubDate>Tue, 13 Jan 2026 00:00:00 +0000</pubDate><author>cryptax</author><guid>https://cryptax.github.io/osindus2025/</guid><description><![CDATA[OSINT Industries Christmas 2025 CTF Find the Masked Man Description In this first challenge, a photograph was taken on December 3rd, 2023 around 18:00 and we must identify the nearest metro station in Paris. We also get a hint that the scene is located near the intersection of a Rue and an Avenue.
Solution I crop on the part of the image that shows shops.
I can distinctively read &ldquo;Julien&rdquo;, and then perhaps &ldquo;Brasserie&rdquo; or &ldquo;Creperie&rdquo; or something like that, and a shop name ending &ldquo;Aid&rdquo; (maybe an English name).]]></description></item><item><title>XMas Root Me 2025</title><link>https://cryptax.github.io/xmasrootme2025/</link><pubDate>Tue, 13 Jan 2026 00:00:00 +0000</pubDate><author>cryptax</author><guid>https://cryptax.github.io/xmasrootme2025/</guid><description>Xmas Root Me CTF 2025 X-Mas Assistant Day 1 Description of the challenge &amp;ldquo;Meet your X-Mas Assistant! It will help you throughout this entire month of CTF, providing a brand-new way to interact with CTFd through a &amp;ldquo;futuristic&amp;rdquo; Chatbot UI. This assistant talks directly to the CTFd API for you! Try it now! Can you exploit its MCP quirks and uncover the flag?
This is not a web challenge.Meet your X-Mas Assistant!</description></item><item><title>Cryptax Nomination Awards 2025 H2</title><link>https://cryptax.github.io/nomination-2025-h2/</link><pubDate>Tue, 16 Dec 2025 00:00:00 +0000</pubDate><author>cryptax</author><guid>https://cryptax.github.io/nomination-2025-h2/</guid><description><![CDATA[Cryptax Nomination Awards. Lol. In other words, I&rsquo;m listing my favorite talks, papers, challenges (etc) for the second half of 2025. Nothing more than that. Okay?
H2 2025 Category Nominated Best security talk W. Beukema, Trust me, I&rsquo;m a shortcut: new lnk abuse methods Best malware research paper T. Letailleur, LinkPro: eBPF rootkit analysis Best AI talk Pancake, Vibe Reversing, r2con Best hacking paper N. Seriot, Print to Play, PagedOut e-Zine, page 38 Best new tool for reverse engineering <i class="fa-solid fa-wrench" aria-hidden="true"></i>&nbsp;r2mcp Best not-so-new tool I learned to use during H2 2025 <i class="fa-solid fa-wrench" aria-hidden="true"></i>&nbsp;polybar Best conference food <i class="fa-solid fa-utensils" aria-hidden="true"></i>&nbsp;UYBHYS Best CTF challenge Xmas Root-Me Challenge Day 03 There were many runner-ups: lots of excellent material to digest at r2con or in PagedOut, a technical blog post by NVISO on Frida&hellip;]]></description></item><item><title>BlackAlps 2025 CTF - s4f3</title><link>https://cryptax.github.io/blackalps2025-s4f3/</link><pubDate>Mon, 01 Dec 2025 00:00:00 +0000</pubDate><author>cryptax</author><guid>https://cryptax.github.io/blackalps2025-s4f3/</guid><description>s4f3 With Phil242, we concentrated on this interesting hardware challenge of Karim.
Description A binary challenge.elf is provided.
Reconnaissance with AI 1 2 $ file challenge.elf challenge.elf: ELF 32-bit LSB executable, Tensilica Xtensa, version 1 (SYSV), statically linked, with debug_info, not stripped I try to get some initial thoughts with r2mcp. It doesn&amp;rsquo;t help me very much, but gives me some idea about the context:
The flag is formatted BA25{.....} and it is redacted in the binary The binary was developed using Arduino My initial prompt:</description></item><item><title>Hack.lu CTF 2025</title><link>https://cryptax.github.io/hacklu2025/</link><pubDate>Mon, 20 Oct 2025 00:00:00 +0000</pubDate><author>cryptax</author><guid>https://cryptax.github.io/hacklu2025/</guid><description>Hack.lu CTF 2025 I played this CTF in a different way: very relaxed, only looked at 4 challenges I was interested in, solved 3 ;P and nearly 4&amp;hellip; Did not even peek at the other challenges (see Conclusion about that).
All challenges at Hack.Lu were organized as if they were items in an IKEA shop, including their names:
MANUAL: I flagged this crypto challenge entirely with ChatGPT. I didn&amp;rsquo;t even need to understand it.</description></item><item><title>BruCON 2025 ICS Hacking Village</title><link>https://cryptax.github.io/brucon2025-ics/</link><pubDate>Fri, 26 Sep 2025 00:00:00 +0000</pubDate><author>cryptax</author><guid>https://cryptax.github.io/brucon2025-ics/</guid><description>BruCON 2025 ICS Hacking Village The ICS Hacking Village at BruCON 2025 was offering a cool challenge, where water flow in Hacktopia city was malfunctioning because of a cyber attack.
The goal of the challenge was to stop the overflow in a water tower and re-open water from a secondary water tank for water to flow again in the building.
Each participant was supplied with a control box consisting of a M5 Core connecting to a few sensors, buttons, potentiometers, and connected to a water tank.</description></item><item><title>Ph0wn Labs #3: Qiling Workshop</title><link>https://cryptax.github.io/qiling2025/</link><pubDate>Fri, 20 Jun 2025 00:00:00 +0000</pubDate><author>cryptax</author><guid>https://cryptax.github.io/qiling2025/</guid><description>Qiling Workshop I followed the Qiling Workshop of Ph0wn Labs #3, by Blackb0x_ For environment setup, I used the Docker container provided on the GitHub link. Qiling is installed in /opt, and there are several root filesystems in /rootfs. There were 2 challenges: one Linux, one Windows. Both challenges can be solved in multiple ways, for example with static analysis, but the goal of this workshop was to use Qiling to solve.</description></item><item><title>Cryptax Nomination Awards 2025 H1</title><link>https://cryptax.github.io/nomination-2025-h1/</link><pubDate>Sat, 14 Jun 2025 00:00:00 +0000</pubDate><author>cryptax</author><guid>https://cryptax.github.io/nomination-2025-h1/</guid><description><![CDATA[Cryptax Nomination Awards. Lol. In other words, I&rsquo;m listing my favorite talks, papers, challenges (etc) for the first half of 2025. Nothing more than that. Okay?
H1 2025 Category Nominated Best cybercrime talk Tammy Harper, Persona theory, infiltration and deception of emerging threat groups at NorthSec Best malware research paper ThreatLabz, DanaBleed: DanaBot C2 server memory leak bug, June 9 2025 <i class="fa-solid fa-file-pdf" aria-hidden="true"></i>&nbsp;Best academic AI paper I read Xinyi Hou, Yanjie Zhao, Shenao Wang, Haoyu Wang, Model Context Protocol (MCP): Landscape, Security Threats and Future Research Directions <i class="fa-solid fa-file-pdf" aria-hidden="true"></i>&nbsp;Most funny talk Jasmin Mair and Lukas Mika, SBOMs – A Tragicomedy in Three Acts at Elbsides Best new tool for reverse engineering <i class="fa-solid fa-wrench" aria-hidden="true"></i>&nbsp;R2ai <i class="fa-solid fa-link" aria-hidden="true"></i>&nbsp;Best old tool I learned to use during H1 2025 <i class="fa-solid fa-wrench" aria-hidden="true"></i>&nbsp;Fzf <i class="fa-solid fa-link" aria-hidden="true"></i>&nbsp;Best twitch sessions I started following in H1 2025 thelaluka <i class="fa-solid fa-video" aria-hidden="true"></i>&nbsp;Best conference food <i class="fa-solid fa-utensils" aria-hidden="true"></i>&nbsp;BSides Kristiansand Best CTF challenge Quantum Kraken Device - the Skeleton Key <i class="fa-solid fa-file-lines" aria-hidden="true"></i>&nbsp;at NorthSec CTF Personal achievements I&rsquo;d like to highlight:]]></description></item><item><title>BSides Kristiansand Badge CTF 2025</title><link>https://cryptax.github.io/kristiansand2025/</link><pubDate>Sat, 07 Jun 2025 00:00:00 +0000</pubDate><author>cryptax</author><guid>https://cryptax.github.io/kristiansand2025/</guid><description>Description We are given a hardware badge with no particular instruction, but we know there are CTF challenges on it.
Investigation The front of the badge has Leds, no screen. The back of the badge has a USB connector, a few exposed pins, a battery holder, and underneath a push button. Also, Morse code for numbers is shown on the back.
When we power on the badge, it blinks, and then nothing happens.</description></item><item><title>N0PS CTF 2025</title><link>https://cryptax.github.io/n0ps2025/</link><pubDate>Thu, 05 Jun 2025 00:00:00 +0000</pubDate><author>cryptax</author><guid>https://cryptax.github.io/n0ps2025/</guid><description>Break my stream Description CrypTopia is testing their next gen encryption algorithm. We believe that the way they implemented it may have a flaw&amp;hellip;
We are given a Python file main.py.
Code analysis The flag is encrypted with a key, which is selected randomly:
1 2 flag = b&amp;#34;XXX&amp;#34; key = os.urandom(256) The encryption consists in a XOR with a keystream derived from the key:
1 2 3 4 5 6 7 def encrypt(self, message): result = [] for char in message: key = next(self.</description></item></channel></rss>