<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://nicetrykiddo.github.io/writeups/</id><title>nicetrykiddo</title><subtitle>Documenting the art of breaking things to understand how they work. CTF writeups, research, and other digital artifacts.</subtitle> <updated>2026-04-11T23:08:14+05:30</updated> <author> <name>nicetrykiddo</name> <uri>https://nicetrykiddo.github.io/writeups/</uri> </author><link rel="self" type="application/atom+xml" href="https://nicetrykiddo.github.io/writeups/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://nicetrykiddo.github.io/writeups/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 nicetrykiddo </rights> <icon>/writeups/assets/img/favicons/favicon.ico</icon> <logo>/writeups/assets/img/favicons/favicon-96x96.png</logo> <entry><title>CREST CTF - transmission.log</title><link href="https://nicetrykiddo.github.io/writeups/posts/crest-ctf-transmissionlog/" rel="alternate" type="text/html" title="CREST CTF - transmission.log" /><published>2026-02-28T19:00:00+05:30</published> <updated>2026-04-11T23:07:37+05:30</updated> <id>https://nicetrykiddo.github.io/writeups/posts/crest-ctf-transmissionlog/</id> <content type="text/html" src="https://nicetrykiddo.github.io/writeups/posts/crest-ctf-transmissionlog/" /> <author> <name>nicetrykiddo</name> </author> <category term="CTF" /> <category term="Crest CTF" /> <summary>Challenge: transmission.log [Handshake Reuse / Shadow Protocol] Category: Crypto Difficulty: Easy (once you notice the reuse) Flag: CREST{mantis_reused_the_channel@ghost!} Overview This log is trying really hard to look like “hybrid quantum-resistant handshake” noise, but the actual bug is classic: a session-unique element is reused. In RSA terms, the key tell is: Two different session...</summary> </entry> <entry><title>CREST CTF - silent_loader</title><link href="https://nicetrykiddo.github.io/writeups/posts/crest-ctf-silentloader/" rel="alternate" type="text/html" title="CREST CTF - silent_loader" /><published>2026-02-28T19:00:00+05:30</published> <updated>2026-02-28T19:00:00+05:30</updated> <id>https://nicetrykiddo.github.io/writeups/posts/crest-ctf-silentloader/</id> <content type="text/html" src="https://nicetrykiddo.github.io/writeups/posts/crest-ctf-silentloader/" /> <author> <name>nicetrykiddo</name> </author> <category term="CTF" /> <category term="Crest CTF" /> <summary>This was a small reversing challenge, but it does one useful thing to waste time: it embeds a string that looks like the answer even though that string is only used when the flag is printed. The actual solve is recovering the environment variable that passes the checks. Flag: CREST{$il3nt_$tAg3_v3rifi3d} Solve plan I approached it like this: do quick triage with file, strings, and a ba...</summary> </entry> <entry><title>CREST CTF - research_daemon</title><link href="https://nicetrykiddo.github.io/writeups/posts/crest-ctf-researchdaemon/" rel="alternate" type="text/html" title="CREST CTF - research_daemon" /><published>2026-02-28T19:00:00+05:30</published> <updated>2026-03-01T15:08:55+05:30</updated> <id>https://nicetrykiddo.github.io/writeups/posts/crest-ctf-researchdaemon/</id> <content type="text/html" src="https://nicetrykiddo.github.io/writeups/posts/crest-ctf-researchdaemon/" /> <author> <name>nicetrykiddo</name> </author> <category term="CTF" /> <category term="Crest CTF" /> <summary>Research Daemon Writeup This is my full solve note for the Research Daemon pwn challenge. Challenge text: Research Daemon 500 Ghost Mantis operates a background research daemon responsible for processing experimental payload data submitted by internal teams. The daemon runs continuously, parsing input, managing internal buffers, and dispatching handlers based on command types. It was develo...</summary> </entry> <entry><title>CREST CTF - Read Between The Lines</title><link href="https://nicetrykiddo.github.io/writeups/posts/crest-ctf-read-between-the-lines/" rel="alternate" type="text/html" title="CREST CTF - Read Between The Lines" /><published>2026-02-28T19:00:00+05:30</published> <updated>2026-02-28T19:00:00+05:30</updated> <id>https://nicetrykiddo.github.io/writeups/posts/crest-ctf-read-between-the-lines/</id> <content type="text/html" src="https://nicetrykiddo.github.io/writeups/posts/crest-ctf-read-between-the-lines/" /> <author> <name>nicetrykiddo</name> </author> <category term="CTF" /> <category term="Crest CTF" /> <summary>Challenge We are given a memo file: misc/challenge_memo.txt Prompt summary: The memo looks normal. No malicious links or attachments. Ghost Mantis is known for hiding signals in plain sight. We need to recover the hidden communication. Flag format: CREST{} Initial thought process Since the challenge title is Read Between The Lines, I immediately assumed this was not going t...</summary> </entry> <entry><title>CREST CTF - operator_mistake</title><link href="https://nicetrykiddo.github.io/writeups/posts/crest-ctf-operatormistake/" rel="alternate" type="text/html" title="CREST CTF - operator_mistake" /><published>2026-02-28T19:00:00+05:30</published> <updated>2026-02-28T19:00:00+05:30</updated> <id>https://nicetrykiddo.github.io/writeups/posts/crest-ctf-operatormistake/</id> <content type="text/html" src="https://nicetrykiddo.github.io/writeups/posts/crest-ctf-operatormistake/" /> <author> <name>nicetrykiddo</name> </author> <category term="CTF" /> <category term="Crest CTF" /> <summary>Overview This one is the opposite of ghost_mantis_scanner: the binary looks like it might hide something deeper, but the intended solve is just to pay attention to the environment variable exposed by strings and confirm the branch in disassembly. Flag: CREST{0p-m4nti$-07-0228-4ttrib} Solve plan Because the challenge felt intentionally easy, I kept the workflow simple: run the binary o...</summary> </entry> </feed>
