DASHBOARD WRITEUPS LINKTREE

Weaving Security. Breaking Systems.

root@spider1sec:~$
SCROLL_DOWN

LIVE_DASHBOARD

Real-time reconnaissance simulation

spider1sec@recon:~
$ spider-recon --target *.example.com --mode aggressive
PORT_SCAN
22/tcp ssh OPEN
80/tcp http OPEN
443/tcp https OPEN
3306/tcp mysql FILTERED
8080/tcp http-proxy OPEN
SUBDOMAIN_ENUM
api.example.com
admin.example.com
staging.example.com
dev.example.com
internal.example.com
cdn.example.com
WEB_CRAWLER
200 /api/v2/users
301 /admin/login
403 /internal/config
200 /api/v2/auth/token
500 /debug/vars

WRITEUPS

Field reports from the deep web

FLAGYARD CRYPTO

Reduced Collisions — Lattice-Based Hash Collision

Breaking a lattice-based hash function using matrix recovery and LLL-based Short Integer Solution (SIS) attack.

CTF CRYPTANALYSIS

Custom Block Cipher — Reversing a 32-Round Feistel

Breaking a keyless custom block cipher by exploiting Python's tuple assignment semantics and XOR self-inverse properties.

CTF CRYPTO

Timewise — Haskell Modular Exponentiation

Reversing recursive Haskell functions to reveal modular exponentiation, then applying Fermat's Little Theorem to recover the secret.

PICOCTF RSA

Corrupt-Key-1 — RSA Key Recovery via FactorDB

Recovering a corrupted 1024-bit RSA private key by factoring the modulus through public databases.

PICOCTF CRYPTO

Playfair — 6×6 Variant Cipher Decryption

Automating decryption of a 6×6 Playfair variant with dynamic alphabet generation and socket-based server interaction.

PICOCTF RSA

Corrupt-Key-2 — Multivariate Coppersmith Attack

Recovering a partially corrupted RSA prime using lattice reduction (LLL) and multivariate Coppersmith's method.

HTB AES

Wonky AES — Differential Fault Analysis

Exploiting fault injection in AES Round 9 to recover the full key via DFA and reverse key schedule.

CRYPTOHACK ALGEBRA

Quo Vadis — Galois Ring Isomorphism Attack

Exploiting ring isomorphisms with Newton lifting and linear algebra over Z_{2^k} to recover secret polynomial evaluations.

BREIZHCTF AES-GCM

AES-GCM Nonce Reuse — The Forbidden Attack

Recovering the GHASH authentication key via nonce reuse and counter mismanagement to forge admin tokens.

CYBERTALENTS ZKP

SIGMA Protocol — Zero-Knowledge Proof Challenge

Implementing Schnorr's SIGMA protocol to prove knowledge of a discrete log without revealing the secret.