SEKAI CTF 2025: Sekai Bank Transaction
IntroductionThis document provides a detailed walkthrough of the vulnerability found in the SekaiBank Android application and how we exploited it to steal one m…
Writeups, research, and technical notes from a Senior Security Consultant and competitive CTF player based in Singapore.
IntroductionThis document provides a detailed walkthrough of the vulnerability found in the SekaiBank Android application and how we exploited it to steal one m…
Team: MAGER / Vantage Point SecurityRank: 5/1110 Password Manager 2.0OverviewChallenge ini adalah sebuah aplikasi Password Manager yang memiliki sebua…
Check my writeup on this challenge below:https://jekyll-theme-chirpy-git-master-noxlaw.vercel.app/posts/all-mobile-tcp1p-ctf/
Check my walkthrough video on this challenge below:https://www.facebook.com/lawbytee/videos/1328446641202923
Author: aimardcr Seperti yang sudah ada dideskripsi challenge nya, untuk menyelesaikan challenge ini kita perlu untuk membuat malicious/exploit aplikasi se…
iOS applications store data in several locations — some secure by default, others frequently misused. This guide covers how to locate, extract, and assess data …
Root detection blocks security testing on production apps. Bypassing it is a standard step in mobile penetration testing to assess the app’s true security postu…
LDAP injection occurs when user input is unsafely embedded into LDAP queries. Unlike SQL injection, LDAP injection is less commonly tested — but it’s prevalent …
Clickjacking tricks users into clicking on hidden or disguised interface elements. While often low severity alone, combined with sensitive actions (password cha…
Open redirects are often dismissed as low severity, but when chained with OAuth token theft or SSRF bypass, they become critical. They also enable highly convin…