<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>CTF on THALIUM</title><link>/tags/ctf/</link><description>Recent content in CTF on THALIUM</description><generator>Hugo</generator><language>en-us</language><copyright>Copyright (c) 2026, all rights reserved.</copyright><lastBuildDate>Tue, 07 Nov 2023 12:00:00 +0100</lastBuildDate><atom:link href="/tags/ctf/index.xml" rel="self" type="application/rss+xml"/><item><title>ECW 2023: Centralized Memory (write-up)</title><link>/posts/ecw-2023-centralized-memory-write-up/</link><pubDate>Tue, 07 Nov 2023 12:00:00 +0100</pubDate><guid>/posts/ecw-2023-centralized-memory-write-up/</guid><description>&lt;strong&gt;Centralized Memory&lt;/strong&gt; was a hard Linux pwn challenge created for the European Cyber Week CTF 2023 qualifiers. This write-up covers the intended method of exploitation through a race condition, an AES padding bug and a stack overflow.</description></item><item><title>ECW 2023: kaleidoscope (write-up)</title><link>/posts/ecw-2023-kaleidoscope-write-up/</link><pubDate>Tue, 07 Nov 2023 12:00:00 +0100</pubDate><guid>/posts/ecw-2023-kaleidoscope-write-up/</guid><description>&lt;strong&gt;kaleidoscope&lt;/strong&gt; was a hard reverse engineering challenge created for the European Cyber Week CTF 2023 qualifiers, with a focus on Windows-specific mechanisms and VM-based obfuscation.</description></item><item><title>ECW 2023: The Calculator in Shadow (write-up)</title><link>/posts/ecw-2023-the-calculator-in-shadow-write-up/</link><pubDate>Tue, 07 Nov 2023 12:00:00 +0100</pubDate><guid>/posts/ecw-2023-the-calculator-in-shadow-write-up/</guid><description>&lt;strong&gt;The Calculator in Shadow&lt;/strong&gt; was a hard pwn challenge created for the European Cyber Week CTF 2023 qualifiers. It included exploiting a RISC-V calculator running on top of a customized QEMU that featured a poorly implemented shadow stack.</description></item><item><title>ECW 2021 - WriteUp</title><link>/posts/ecw2021-writeup/</link><pubDate>Mon, 25 Oct 2021 12:00:01 +0100</pubDate><guid>/posts/ecw2021-writeup/</guid><description>&lt;p&gt;For the &lt;a href="https://www.european-cyber-week.eu/"&gt;European Cyber Week&lt;/a&gt; CTF 2021 Thalium created some challenges in our core competencies: reverse and exploitation. This blog post presents some of the write-ups:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="#chest"&gt;Chest (36 solve) - reverse&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#fsb-as-a-service"&gt;FSB as a service (3 solve) - exploitation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="#wysiwyg"&gt;WYSIWYG (3 solve) - reverse&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Pipe Dream (1 solve) - reverse
&lt;ul&gt;
&lt;li&gt;the author posted his solution on &lt;a href="https://face.0xff.re/posts/ecw-ctf-2021-pipe-dream-writeup/"&gt;his personal blog&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Thalium&amp;rsquo;s challenges have been less resolved than others. They were not that difficult, but probably a bit more unexpected. A few additional challenges designed by Thalium are:&lt;/p&gt;</description></item><item><title>Cyber Apocalypse 2021 5/5 - Artillery</title><link>/posts/apocalypse2021-artillery/</link><pubDate>Wed, 28 Apr 2021 12:00:04 +0100</pubDate><guid>/posts/apocalypse2021-artillery/</guid><description>&lt;p&gt;&lt;strong&gt;Artillery&lt;/strong&gt; was a web challenge of the Cyber Apocalypse 2021 CTF organized by HackTheBox. We were given the source code of the server to help us solve the challenge. This challenge was a nice opportunity to learn more about &lt;strong&gt;XXE&lt;/strong&gt; vulnerabilities.&lt;/p&gt;</description></item><item><title>Cyber Apocalypse 2021 4/5 - Discovery</title><link>/posts/apocalypse2021-discovery/</link><pubDate>Wed, 28 Apr 2021 12:00:03 +0100</pubDate><guid>/posts/apocalypse2021-discovery/</guid><description>&lt;p&gt;One of the least solved challenges, yet probably not the most difficult one. It is a Hardware challenge, though it is significantly different from the other challenges of this category. The first thing to spot is that when starting the challenge machine, we have access to two network services:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;an HTTP server, requesting an authentication&lt;/li&gt;
&lt;li&gt;an AMQP broker, &lt;code&gt;rabbitmq&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Cyber Apocalypse 2021 3/5 - Off the grid</title><link>/posts/apocalypse2021-off-the-grid/</link><pubDate>Wed, 28 Apr 2021 12:00:02 +0100</pubDate><guid>/posts/apocalypse2021-off-the-grid/</guid><description>&lt;p&gt;&lt;strong&gt;Off-the-grid&lt;/strong&gt; was the 4th hardware challenge of the Cyber Apocalypse 2021 CTF organized by HackTheBox.
We were given an &lt;a href="/posts/misc/off-the-grid/off_the_grid.sal"&gt;Saleae trace&lt;/a&gt; and schematics to analyse. Thalium was one of the very first of 99 players to complete it.&lt;/p&gt;</description></item><item><title>Cyber Apocalypse 2021 2/5 - Wii-Phit</title><link>/posts/apocalypse2021-wii-phit/</link><pubDate>Wed, 28 Apr 2021 12:00:01 +0100</pubDate><guid>/posts/apocalypse2021-wii-phit/</guid><description>&lt;p&gt;&lt;strong&gt;Wii-Phit&lt;/strong&gt; was the only &lt;em&gt;Hard&lt;/em&gt; crypto challenge designed by &lt;a href="https://cryptohack.org/"&gt;CryptoHack&lt;/a&gt; for the &lt;a href="https://www.hackthebox.eu/cyber-apocalypse-ctf-2021"&gt;Cyber Apocalypse 2021&lt;/a&gt; CTF (there were also 4 challenges categorized as &lt;em&gt;Insane&lt;/em&gt; though).&lt;/p&gt;
&lt;p&gt;There is already an excellent &lt;a href="https://blog.cryptohack.org/cyber-apocalypse-2021#wii-phit"&gt;writeup&lt;/a&gt; by the challenge organizers:
one could recognize a well known equation related to the &lt;a href="https://en.wikipedia.org/wiki/Erd%C5%91s%E2%80%93Straus_conjecture"&gt;Erdős–Straus conjecture&lt;/a&gt;, some participants used &lt;a href="https://github.com/Z3Prover/z3"&gt;Z3&lt;/a&gt;.
We took a different approach.&lt;/p&gt;</description></item><item><title>Cyber Apocalypse 2021 1/5 - PWN challenges</title><link>/posts/apocalypse2021-pwn/</link><pubDate>Wed, 28 Apr 2021 12:00:00 +0100</pubDate><guid>/posts/apocalypse2021-pwn/</guid><description>&lt;p&gt;Thalium participated in the &lt;a href="https://www.hackthebox.eu/cyber-apocalypse-ctf-2021"&gt;Cyber Apocalypse 2021&lt;/a&gt; CTF organized last week by &lt;a href="https://www.hackthebox.eu/"&gt;HackTheBox&lt;/a&gt;.
It was a great success with 4,740 teams composed of around 10,000 hackers from all over the world.
Our team finished in fifth place and solved sixty out of the sixty-two challenges:&lt;/p&gt;
&lt;p&gt;
 &lt;a href="/posts/img/Cyber_Apocalypse_2021-scoreboard.png" target="_blank"&gt;
 &lt;img src="/posts/img/Cyber_Apocalypse_2021-scoreboard.png" alt="fig_scoreboard"&gt;
 &lt;/a&gt;

&lt;/p&gt;
&lt;p&gt;This article explains how we solved each pwn challenge and what tools we used, it is written to be accessible to beginners:&lt;/p&gt;</description></item></channel></rss>