LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍
SUMMARY
This is a video I recorded about BitsKrieg CTF 2025 , specifically about the 3 web challenges I managed to solve.
This was interesting cause it showcased 2 nice tricks : UTF8 overflow and an interesting CSP bypass using an open redirect.
LINKS
- https://ctf.bitskrieg.in
- https://shazzer.co.uk/unicode-table
- https://www.w3.org/TR/CSP3/#source-list-paths-and-redirects
- https://portswigger.net/research/bypassing-character-blocklists-with-unicode-overflows
WHO AM I?
I've worked in Engineering for more than 15 years and Cyber Security for almost 3 years now. I've done Bug Bounty hunting for a few years with some nice successes. I'm here to share my journey and learning which hopefully will help others see a path to Bug Bounty Hunting, AppSec or even Engineering !