HTB - Quantum: Flagportation
Recovering teleported 2-bit symbols by applying the correct X/Z correction mapping from Bell-measurement outputs.
Recovering teleported 2-bit symbols by applying the correct X/Z correction mapping from Bell-measurement outputs.
Recovering the passphrase by combining regex-gated format constraints with chunk-wise ASCII product equations.
Bypassing hyperlink initialization with a crafted 5-qubit instruction sequence that satisfies the hidden share-equality checks.
ARM32 stack overflow with canary+PIE bypass: staged leaks, libc recovery, and ret2libc shell via ARM gadget chain.
Recovering an affine map over GF(257) from chosen plaintexts to decrypt the blueprint ciphertext.
Exploiting a CBC padding oracle in token login to decrypt account data and drain balance to zero.
Exploiting a Paillier optimization bug that leaks the blinding term and reveals the encrypted secret message.
Recovering an RSA-encrypted 42-bit multiplicative AES key with meet-in-the-middle and decrypting the ECB-protected secret.
CTF notes by Zero