
echofaas - CSCG 2025 - Write-Up
Escalate your privileges with kubernetes.

Escalate your privileges with kubernetes.

Find a SQL injection vulnerability and a insecure object deserialization vulnerability to get the flag.

Escalate your privileges with kubernetes.

Investigate traffic of a C2 connection.

Use a AES-CRT padding oracle vulnerability to extract the flag.

Leak data and solve a sudoku.

Break a weak RSA cookie encryption system and retrieve the flag.

Find the original flag by brute forcing a modular equation.

Investigate a damaged disk.

Use XSS, RFI and some cyber skills get a shell on the server and escalate your privileges.