ctfnote.com
Search
⌃K
/home/ret2basic.eth
Auditing
✅
Ethereum and Solidity
DeFi
Secureum
Epoch 0
✅
Epoch ∞
Beyond Secureum
Audit Findings
Foundry and Hardhat
EVM
MEV
DeFiHackLabs
Research
Red Teaming
✅
Enumeration
✅
Exploitation
✅
Buffer Overflow
✅
Privilege Escalation
✅
Post Exploitation
✅
Pivoting
Active Directory (AD)
Command & Control (C2)
Malware Development
Cryptography
Hash Functions
MAC
AES
Diffie-Hellman
RSA
ECC
Digital Signature
JWT
PRNG
SSL/TLS
Research
Computer Science
Linux
Python
HTML, CSS, JavaScript, and React
C, C++, and C#
Data Structures and Algorithms
The Linux Programming Interface
Computer Systems
Databases
Distributed Systems
Static Analysis
Web
✅
Prerequisites
File Upload
SQL Injection (SQLi)
Cross-Site Scripting (XSS)
CSRF and SSRF
XML External Entities (XXE)
Insecure Deserialization
HTTP Request Smuggling
OS Command Injection
✅
Directory Traversal
HTTP Parameter Pollution
Server-Side Template Injection (SSTI)
LDAP Injection
Redis
Pwn
Linux Exploitation
Windows Exploitation
Fuzzing
Reverse
Bytecode
angr
Powered By
GitBook
Secureum
Secureum
All auditors must go over Secureum multiple times until you feel comfortable. I can't emphasis enough how important it is.
Previous
Transparent Upgradeable Proxy
Next
Epoch 0
Last modified
1mo ago