🔬
CTFs
  • 🚩nitrozeus's CTF Writeups
  • Tutorial
    • Install Windows 10 VM on M1 Mac
  • My Notes
    • Capture-The-Flag
      • Windows Forensics
      • Memory Forensics
      • Base32, Base64
      • Steganography
      • Email Analysis
      • Malware Analysis
      • MD4, MD5 Cracking
      • Social Engineering
      • OSINT
      • Google Dorking
      • Reconnaissance
      • Port Scan (nmap)
  • 2023
    • 🧠BrainHack CDDC 2023
      • Gallery
      • Eazy Network Analysis
      • What the hell happened to the PC?!
      • Audio Steganography
  • 2022
    • 🐱Grey Cat The Flag 2022
      • Parcel
      • Memory Game (Part 1)
      • Too Fast
      • Entry
      • Ghost
      • Firmware
      • Image Upload
      • flappy-js
    • ⛵STANDCON 2022
      • I Sea You (Part 1)
      • Locate Me
      • I Sea You (Part 2)
      • Trolley Trolling
      • A New Gateway
      • Walks like a cat, barks like a dog
      • Shark in the Ocean
      • Atlan Safe P1
      • Gift from Russia
      • Asmuth Shares
      • Memedump
      • Warmup Forensics
    • 🦁STACK the Flags 2022
      • Finding Nyan
      • New Task!
      • Hit you with that
      • Cobalt Struck
      • PyRunner
Powered by GitBook
On this page
  • GitHub
  • root@nitrozeus:~# whoami
  • # groups
  • # 2023
  • # 2022

nitrozeus's CTF Writeups

Write-ups from various CTFs that I've participated in with my friends.

NextInstall Windows 10 VM on M1 Mac

Last updated 1 year ago

What is CTF?: Capture the Flag (CTF) in is an exercise in which "flags" are secretly hidden in purposefully- programs or websites. Competitors steal flags either from other competitors (attack/defense-style CTFs) or from the organizers (jeopardy-style challenges).

GitHub

root@nitrozeus:~# whoami

My online persona goes by the name nitroz3us. Currently, I'm a student at Singapore Management University (SMU). I served in the military for three years, between 2018 to 2021, and was posted to a Cyber unit (inaugural batch of CyberNSF). I'm a cybersecurity addict and contrary to popular belief, I love blue team over red team. I am fairly new to CTF so join me on my journey to many more CTFs to come!

I love the idea of finding ways and trying to be ahead of the hackers, the same way, they try to be ahead of us. My end goal is to work in a Digital Forensics/Incident Response (IR) team. Currently, I have three years of SOC experience.

I've worked in, both as a SOC Analyst;

  • Cyber Security Agency of Singapore (CSA) under National Cyber Threat Monitoring Centre (NCTMC) division

  • Ensign InfoSecurity

# groups

Good to know: You can participate in any CTFs either alone or as a team. It's way more fun to compete with a team in my opinion. Sharing ideas and knowledge helps with the learning curve.

As of now, I do not have a dedicated team, most of my CTF's participation are with a group of friends which often changes between each CTFs.

# 2023

CTF Name
Type
Team Name

Jeopardy

BLUEHELMETS

# 2022

CTF Name
Type
Team Name

Jeopardy

Neo Turf Masters

Jeopardy

LAN_D0DGERS

Jeopardy

TeamBML

🚩
computer security
vulnerable
https://github.com/nitroz3us
CDDC 2023
STANDCON 2022
STACK The Flag 2022
Grey Cat The Flag 2022