blog.itarow.xyz/posts/bzhctf2024_inthewild

Preview meta tags from the blog.itarow.xyz website.

Linked Hostnames

9

Search Engine Appearance

Google

https://blog.itarow.xyz/posts/bzhctf2024_inthewild

Breizh CTF 2024 - Write-up CTF A/D - In The Wild - Pwn

Some write up of cool CTF's challenges and infosec content



Bing

Breizh CTF 2024 - Write-up CTF A/D - In The Wild - Pwn

https://blog.itarow.xyz/posts/bzhctf2024_inthewild

Some write up of cool CTF's challenges and infosec content



DuckDuckGo

https://blog.itarow.xyz/posts/bzhctf2024_inthewild

Breizh CTF 2024 - Write-up CTF A/D - In The Wild - Pwn

Some write up of cool CTF's challenges and infosec content

  • General Meta Tags

    10
    • title
      Breizh CTF 2024 - Write-up CTF A/D - In The Wild - Pwn | Itarow
    • charset
      utf-8
    • X-UA-Compatible
      IE=edge
    • description
      Some write up of cool CTF's challenges and infosec content
    • viewport
      width=device-width, initial-scale=1
  • Open Graph Meta Tags

    4
    • og:title
      Breizh CTF 2024 - Write-up CTF A/D - In The Wild - Pwn
    • og:description
      Here is the write-up of Vault challenge which I created for the Breizh CTF 2024. This is a Pwn challenge classified as medium. Description During the CTF A/D our team had one of our services compromised, running a binary written in the C of our memories. We no longer have control over the service, so please help us by getting it back... To help you, we only have the recording of the exploit launched by the opposing team, so we hope that's enough for you.
    • og:type
      article
    • og:url
      https://blog.itarow.xyz/posts/bzhctf2024_inthewild/
  • Twitter Meta Tags

    3
    • twitter:card
      summary
    • twitter:title
      Breizh CTF 2024 - Write-up CTF A/D - In The Wild - Pwn
    • twitter:description
      Here is the write-up of Vault challenge which I created for the Breizh CTF 2024. This is a Pwn challenge classified as medium. Description During the CTF A/D our team had one of our services compromised, running a binary written in the C of our memories. We no longer have control over the service, so please help us by getting it back... To help you, we only have the recording of the exploit launched by the opposing team, so we hope that's enough for you.
  • Link Tags

    8
    • canonical
      https://blog.itarow.xyz/posts/bzhctf2024_inthewild/
    • icon
      https://blog.itarow.xyz/images/favicon.ico
    • preload
      /lib/font-awesome/webfonts/fa-brands-400.woff2
    • preload
      /lib/font-awesome/webfonts/fa-regular-400.woff2
    • preload
      /lib/font-awesome/webfonts/fa-solid-900.woff2

Emails

1
  • ?subject=Breizh%20CTF%202024%20-%20Write-up%20CTF%20A%2fD%20-%20In%20The%20Wild%20-%20Pwn&body=Check out this article: https%3a%2f%2fblog.itarow.xyz%2fposts%2fbzhctf2024_inthewild%2f

Links

13