
Recruitment - CSCG 2025 - Write-Up
Exploit a XSS vulnerability.

Exploit a XSS vulnerability.

Find a XSS vulnerability.

Find a Information Disclosure vulnerability.

Escalate your privileges with kubernetes.

Find a SQL injection vulnerability and a insecure object deserialization vulnerability to get the flag.

Escalate your privileges with kubernetes.

Investigate traffic of a C2 connection.

Use a AES-CRT padding oracle vulnerability to extract the flag.

Leak data and solve a sudoku.

Break a weak RSA cookie encryption system and retrieve the flag.