SPIDER1CODE
1.9K subscribers
130 photos
22 videos
12 files
81 links
Spider1Code is the first Arab community that brings together cybersecurity artificial intelligence, and more โœจ๐Ÿค
Download Telegram
Bug bounty writeup ๐Ÿค๐Ÿ‘Œ๐Ÿป
All my certificates in 2025 ๐Ÿค

ุนุงู… ุฌุฏูŠุฏ ุณุนูŠุฏ ู„ูƒู… ูˆ ุจ ุงุฐู† ุงู„ู„ู‡ ู…ู† ุชุทูˆุฑ ู„ูŠ ุชุทูˆุฑ ู„ู†ุง ุฌู…ูŠุนุง ๐Ÿค
โค4
๐Ÿ‘Œ๐Ÿป๐Ÿค
โค6
ุจุนุฏ ู…ุง ุฑุงุฌุนุช ูˆ ุงุชุงูƒุฏ ุงุชุนู„ู…ุช ุญุงุฌู‡ ุฌุฏูŠุฏู‡ ุงู†ูŠ ู…ุด ุงุณุชุนุฌู„ ุนู„ูŠ ุงู„ุญุงุฌู‡

ุตุญูŠุญ ุดูƒู„ู‡ุง ูŠุจุงู† ุงู†ู‡ุง ูุนู„ุง xss ุจุณ ุงู„ุญู‚ูŠู‚ู‡ ู„ุง ูˆ ู‡ุฑุจุท ู…ู‚ูˆู„ู‡ ุฏูŠ ุจูƒู„ ุดุฆ

ุทู„ู…ุง ู…ููŠุด impact ู…ููŠุด Vulnerability


ุงู„ุนูŠุจ ู…ุด ูู„ ุบู„ุท ุงู„ุนูŠุจ ุงู†ูŠ ุงุตุญุญ ุงู„ุบู„ุท ูˆ ุงู„ู…ุฑู‡ ุงู„ุฌุงูŠู‡ ู‡ุชุงูƒุฏ ู…ูŠุช ู…ุฑู‡ ูˆ ุดูƒุฑุง ู„ูƒู„ ูˆุงุญุฏ ู‚ุงู„ูŠ ูƒู„ู…ู‡ ูƒูˆูŠุณู‡ ูˆ ุดูƒุฑุง ุจุฑุฏูˆ ุงู„ูŠ ู‚ู„ูŠ ูƒู„ู…ู‡ ูˆุญุดู‡

ู ู„ุงุชู†ูŠู† ุงู†ุง ุงุชุนู„ู…ุช ูˆ ุงุณุชูุฏุช

ูˆ ุงู†ุช ุงูƒูŠุฏ ูŠู„ูŠ ุจุชู‚ุฑุงุก ุงุณุชูุฏุช ู…ู† ุงู„ู…ูˆู‚ู ุฏุง ูˆ ุงุดูˆููƒู… ุนู„ู‰ ุฎูŠุฑ ๐ŸคโœŒ๐Ÿป
โค3
๐Ÿšฉ New CTF Writeup โ€“ Breizh CTF


Iโ€™ve just published a technical writeup for the Authentification challenge from Breizh CTF, focusing on a flawed implementation of AES-GCM at the counter management level.


This is not just about โ€œnonce reuse is badโ€.


The writeup walks through how :


Misusing the Jโ‚€ counter


Breaks both confidentiality and integrity
Allows recovery of the GHASH key (H)


And enables full forgery of a valid admin token


The goal was to explain why this class of bugs is terminal in AEAD schemes, not just how to exploit it.


๐Ÿ”— Full writeup on Medium :


https://spider1sec.medium.com/breizh-ctf-authentification-9707750140bc


#BreizhCTF #CTF #Cryptography #AESGCM #CyberSecurity #InfoSec #Writeup #Medium
โค1
Quo vadis? โ€” ECSC 2024 (Italy)

I recently solved โ€œQuo vadis?โ€, a cryptography challenge from ECSC 2024 (Italy), published on CryptoHack.
The challenge was solved by only 8 participants, and I also wrote a full technical write-up explaining the solution in depth.

What made this challenge special wasnโ€™t implementation difficulty, but the core idea :

Working with Galois Rings rather than common finite fields
Exploiting isomorphisms between different ring constructions
Reducing the problem to linear algebra over โ„ค / 2แตโ„ค
Using Newton lifting to move solutions across ring levels

This was a reminder that advanced crypto CTFs are often less about tools, and more about mathematical understanding and clean reasoning.

I shared a detailed write-up covering:

The mathematical insight behind the challenge

The full solving strategy

Implementation details in Sage


๐Ÿ”— Write-up :

https://spider1sec.medium.com/quo-vadis-ecsc-2024-italy-cryptohack-70cd091be2b8

#Cryptography #AppliedCryptography #Mathematics
โค5