School web app development: five years later

In: Dev /

As soon as I got my first Android-powered smartphone around nine years ago, I immediately researched how to create apps for it. And within no more than three days, I created an app that made my school’s substitution plans accessible on mobile devices. A couple years passed, the app improved, and soon school staff picked up on it and wanted me to build a similar web-based application to cover all devices. It’s now been nearly five years since I stopped maintaining it and today I want to take a look at the web app once more and assess it from what I’ve learned since then about web development and cybersecurity.

Read more.

HapPY Birthday: A custom CTF challenge for a non-CTF player

In: Misc /

I like CTFs. Admittedly, I’m not particularly good at them. I try my best and learn from other people’s solutions to unique challenges after the end of a competition. I also like my roommate who I’ve known for several years now. And even though he’s a magnificent problem solver, at least in my opinion, I’m yet to convince him to team up and play some CTFs together. It was his birthday very recently and I prefer experiences as gifts as opposed to materialistic things. So I cobbled together a relatively simple CTF-style challenge for him. In this article, I want to outline a couple interesting bits here and there that I learned in the process of creating a custom challenge. Maybe you’ll find yourself inspired to create a simple challenge of your own.

Read more.

TryHackMe: Dave's Blog Writeup

Dave’s Blog is a room over at TryHackMe with a hard difficulty rating. Dave is ready to show his blog to the world, but he forgot to properly secure his super secret admin panel. After some NoSQL injection to bypass the admin login page, we’re able to send off code that is executed by a Node.JS runtime hosted on the server. The final step to root involves exploiting a binary in one of many possible ways thanks to return-oriented programming.

Read more.