A structured archive of TDS Project 2 writeups and artifacts. The repository covers web exploitation, network forensics, reverse engineering, signal analysis, WebAssembly inspection, blockchain traces, onion-site scraping, and Discourse/course-topic analysis.
| Area | Example | Method |
|---|---|---|
| Web exploitation | Crack the Gate, Power Cookie, SSTI2 | Inspect browser/client behavior, manipulate requests or cookies, and verify recovered flags. |
| Network forensics | Rogue Tower | Analyze captured traffic, reconstruct exfiltrated data, decode/decrypt payloads. |
| Reversing and WebAssembly | Investigative Reversing 4, Some Assembly Required 4 | Inspect binaries/WASM, derive transformations, and decode hidden output. |
| Signal and side-channel analysis | m00nwalk2, SideChannel, Surfing the Waves | Use waveform, spectrogram, timing, or sample decoding to recover hidden data. |
| Project2B investigations | Onion Scraping, Blockchain Precision Transfer, Damaged QR Forensics, Discourse Analysis | Preserve concise methods and final answer payloads for additional investigation tasks. |
- Project2/: primary Project 2 CTF/security questions
- Project2B/: additional investigation and data-trace questions
- Each question folder: README summary, detailed writeup, and supporting artifacts such as scripts, captures, images, audio, WASM, JSON, or generated outputs
The content is for course documentation, reproducibility, and learning. Use the methods in controlled or authorized environments only. Do not reuse exploit techniques against systems you do not own or have explicit permission to test.
See CONTRIBUTING.md. Keep changes question-scoped, document verification, and avoid committing secrets or bulky regenerated artifacts unless required.
MIT License. See LICENSE.