I recently started attempting Ethernaut CTF challenges and it has been a great learning experience solving all these variety of challenges which cover a broad spectrum of topics in...
Detailed Postmortem of Uniswap v2-Schnoodle Exploit
Overview Exploit Transaction On Jun-18-2022 (07:05:24 AM +UTC) A ERC-777 smart contract (Schnoodle, symbol SNOOD) was exploited which resulted in the loss of the entire liquidity...
SECURITY OF EC-SCHNORR SIGNATURE ALGORITHM
Recently Elliot ( a.k.a @robot__dreams ) published some crypto/bitcoin related challenges on the EC-schnorr algorithm and key sharing algorithm used to secure bitcoin wallets. This ...
Login - Fword CTF 2021
tl;dr use hash extension to bypass password check on login. use RSA properties to recover $q$ and get $p$ and therefore $N= p*q$. sign the message given, and get the flag. ...
Encrypted Operations - InCTF Internationals 2021
tl;dr Multiplying the middle element of 3x3 matrix with 9 gets thesum of all elements. Adding the least element of 5x4 matrix with the larget and multiplying this result by 10 ...