SherlockCTF was a collaborative CTF organized by Sherlock and Secureum, for the top 32 participants in february's RACE event. Each participant submitted a CTF level, and for 7 days, the competition was opened. I managed to score 32 points.
First part of the solutions/exploits for the Most Vulnerable DeFi (tm) out there.
Fifth (and last?) part of the solutions to Ethernaut. The challenges in this part are mostly vulnerabilities on more complex contracts, that mimic real exploits.
Fourth part of the solutions to Ethernaut. This time the challenges get harder and more interesting.
Third part of the solutions to Ethernaut. More fun levels, and a little bit harder than before.
Second part of the solutions to Ethernaut. Levels start to get progressively harder, and a lot more interesting to solve and learn.
Another Solidity and Ethereum security CTF game. This time we will be solving Ethernaut, the game hosted by OpenZeppelin.
This last category of challenges is a mix of various types of vulnerabilities that don't really fit into any of the other categories.
These challenges are meant to teach about the fine details of EVM-compatible networks accounts, contract deployment and cryptographic key pairs.
Third post for the CaptureTheEther CTF writeups. Now the focus is on mathematical functions.