A Zena based CTF Team

Hi everybody! Welcome to the last meeting of 2017: the briefing BabyCTF, to warm up. We propose you a set of challenges that you can try to hack during the holidays: this is our Christmas present ...

You understood that SQL Injections are evil. So, you open your browser and type “how to sanitize input in php”. You find that exists a beautiful mysql_real_escape, which claims to remove all escap...

The fourth lesson is the natural consequence of its predecessor: Binary Reversing, Part 2. zxgio begins with the whole suite of IOLI Crackme binaries, using Radare2 to pwn them. What does mov ins...

You successfully downloaded “MoneySafeMultiplier.exe”, because you are an optimistic guy who firmly believes that evil things only happen in movies. Then, your computer is entirely encrypted, and y...

Android is such a beautiful world, full of unicorns and… Wait a minute, is that so? What is hidden under the hood? This is the core of lesson 2: Android Security, Part 1. Simone Aonzo (packmad),...