* .
+ *
. *
* .
░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
░░░░░░░░░▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄░░░░░░░░
░░░░░░░░▄▀░░░░░░░░░░░░▄░░░░░░░▀▄░░░░░░░
░░░░░░░░█░░▄░░░░▄░░░░░░░░░░░░░░█░░░░░░░
░░░░░░░░█░░░░░░░░░░░░▄█▄▄░░▄░░░█░▄▄▄░░░
░▄▄▄▄▄░░█░░░░░░▀░░░░▀█░░▀▄░░░░░█▀▀░██░░
░██▄▀██▄█░░░▄░░░░░░░██░░░░▀▀▀▀▀░░░░██░░
░░▀██▄▀██░░░░░░░░▀░██▀░░░░░░░░░░░░░▀██░
░░░░▀████░▀░░░░▄░░░██░░░▄█░░░░▄░▄█░░██░
░░░░░░░▀█░░░░▄░░░░░██░░░░▄░░░▄░░▄░░░██░
░░░░░░░▄█▄░░░░░░░░░░░▀▄░░▀▀▀▀▀▀▀▀░░▄▀░░
░░░░░░█▀▀█████████▀▀▀▀████████████▀░░░░
░░░░░████▀░░███▀░░░░░░▀███░░▀██▀░░░░░
░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
+
* *
.
+
* .
. *
* .
+
* *
.
+
* .
. *
* .
+
* *
.
+
* .
. *
* .
+
* *
.
+
* .
SECURITY RESEARCHER ■ PENTESTER ■ REVERSING SPECIALIST
VT729830
// SECURITY RESEARCHER & REVERSE ENGINEER //
> WEB SECURITY EXPERT_
> IOT SECURITY SPECIALIST_
> REVERSE ENGINEER_
001
▲ Specialization
Web application security analysis, network and mobile security, IoT security, Reverse Engineering, Quantum Security, Cryptography.
I constantly explore new attack vectors and countermeasures
002
◆ Methodology
The offensive security approach: think like an attacker to build a strong defense.
Bug bounty. CTF competitions. Real vulnerabilities in production.
[ Security analysis ]
[ Network Security ]
[ Mobile Security ]
[ IoT Security ]
[ Reverse Engineering ]
[ Cloud Security ]
[ Binary Exploitation ]
[ Quantum Crypto ]
[ Linux Security ]
[ Windows Security ]
[ ML Security ]
[ Python ]
[ C++ ]
[ Go ]
[ Rust ]
HTB-WRITEUPS
github.com/vt72983/HTB-Writeups
Knowledge base for Hack The Box challenges. Clean, reproducible solutions for complex CTF tasks.
Focus:
[ Binary Exploitation ]
[ Reverse Engineering ]
[ Cryptography ]
[ Quantum Computing ]
CATEGORY
COUNT
CHALLENGES
⚙ REVERSING
9
Exatlon · Hubbub · Bypass · BinCrypt · Rega's Town · Wayback · Virtually Mad · Maze · Hexecution
● QUANTUM
5
Flagportation · Global Hyperlink · Phase Madness · QLotto · Untrusted Node
■ CRYPTO
3
Rhome · Noncesense · Wonky AES
▲ GAMEPWN
1
Nostalgia
◆ AI / ML
1
Prometheon
★ WEB
1
Magical Palindrome
☆ MISC
3
Not Posixtive · Broken Shell · Micro Storage
// FEATURED WRITEUP //
QUANTUM ■ MEDIUM
Untrusted Node
QKD simulation with redundancy flaw. Alice sends chunks of identical qubits — measuring the first two in different bases (Z and X) and passing the rest to Bob allows a perfect MitM attack without alerting the reconciliation protocol.
TOOLS: pwntools ■ Python ■ QKD ■ SHA-256 ■ XOR
* .
. +
+ *
.
⠀⠀⠉⠛⠛⠻⢿⣿⣿⣿⣿⣿⣿⣶⣶⣶⣶⣶⣶⣶⣶⣦⣤⣄⡀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠚⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⡄⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠘⠛⠿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠛⢿⣿⣿⣿⠟⠛⠋⠉⠉⠉⠙⣿⣿⣿⣿⣶⣀⠀
⠀⠀⠀⠰⠶⠿⢰⣿⣶⣦⠀⠀⢸⣿⣿⣦⡄⠀⢀⣴⣾⣿⣿⣿⡿⠿⣿⣿⣿⠇
⠀⠀⠀⠀⠀⠀⠀⠻⠿⠃⠀⠀⠀⣿⣿⣿⣧⠀⠀⠉⣉⣉⣩⣥⡶⠀⠀⠀⣿⡇
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠻⣿⣿⣿⣿⠀⠀⣻⣿⣿⣿⠃⠀⠀⢠⣿⠃
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠉⠉⠁⣴⣿⣿⣿⠟⠃⡀⠀⢠⣿⠟⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣠⣤⣄⠀⣤⣤⣤⢰⣿⡦⣿⠀⣿⣿⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠛⠛⠛⠀⠛⠛⠋⠈⠉⠀⠀⢀⣿⣿⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢴⡆⣤⣤⣄⡄⢀⣀⣀⢀⣀⢀⡄⠀⢨⣿⣿⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠘⠃⣿⣿⣿⠇⣿⣿⡋⣿⠏⠛⣃⣤⣾⣿⣿⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣤⣄⣠⣤⣠⣴⣶⣾⣿⣿⣿⣿⣿⣿⡀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠹⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡇⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠺⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⠁
. *
* +
.
+ *
* .
. +
+ *
.
* +
. *
+ .
* +
. *
* +
.
+ *
* .
. +
+ *
.
* +
. *
+ .
* +