<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://kinntaey.github.io/</id><title>CTF &amp; Study notes</title><subtitle>A minimal, responsive and feature-rich Jekyll theme for technical writing.</subtitle> <updated>2026-04-11T20:01:03+10:00</updated> <author> <name>Taehee Kim</name> <uri>https://kinntaey.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://kinntaey.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://kinntaey.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 Taehee Kim </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>[Dreamhack] simple_sql_chatgpt</title><link href="https://kinntaey.github.io/posts/DREAMHACK-SIMPLE_SQL_CHATGPT/" rel="alternate" type="text/html" title="[Dreamhack] simple_sql_chatgpt" /><published>2026-04-11T14:00:00+10:00</published> <updated>2026-04-11T14:00:00+10:00</updated> <id>https://kinntaey.github.io/posts/DREAMHACK-SIMPLE_SQL_CHATGPT/</id> <content type="text/html" src="https://kinntaey.github.io/posts/DREAMHACK-SIMPLE_SQL_CHATGPT/" /> <author> <name>Taehee Kim</name> </author> <category term="CTF Writeup" /> <category term="Web Hacking" /> <summary>Challenge Overview Challenge: simple_sql_chatgpt Platform: Dreamhack Category: Web — SQL injection Vulnerable Query The application constructs an SQL query using unsanitised user input: res = query_db(f"select * from users where userlevel='{userlevel}'") Resulting SQL: SELECT * FROM users WHERE userlevel = '[input]' Because the userlevel parameter is directly embedded into the q...</summary> </entry> <entry><title>[Dreamhack] XSS Filtering Bypass</title><link href="https://kinntaey.github.io/posts/DREAMHACK-XSS-FILTERING-BYPASS/" rel="alternate" type="text/html" title="[Dreamhack] XSS Filtering Bypass" /><published>2026-04-08T14:00:00+10:00</published> <updated>2026-04-08T17:44:30+10:00</updated> <id>https://kinntaey.github.io/posts/DREAMHACK-XSS-FILTERING-BYPASS/</id> <content type="text/html" src="https://kinntaey.github.io/posts/DREAMHACK-XSS-FILTERING-BYPASS/" /> <author> <name>Taehee Kim</name> </author> <category term="CTF Writeup" /> <category term="Web Hacking" /> <summary>Challenge Overview Challenge: XSS Filtering Bypass Platform: Dreamhack Category: Web — Cross-Site Scripting Source Code Analysis First, analyse the contents of index.html. {% extends "base.html" %} {% block title %}Index{% endblock %} {% block head %} {{ super() }} &amp;lt;style type="text/css"&amp;gt; .important { color: #336699; } &amp;lt;/style&amp;gt; {% endblock %} {% block content ...</summary> </entry> <entry><title>[Dreamhack] image-storage</title><link href="https://kinntaey.github.io/posts/DREAMHACK-IMAGE-STORAGE/" rel="alternate" type="text/html" title="[Dreamhack] image-storage" /><published>2026-03-20T15:00:00+11:00</published> <updated>2026-03-21T10:33:29+11:00</updated> <id>https://kinntaey.github.io/posts/DREAMHACK-IMAGE-STORAGE/</id> <content type="text/html" src="https://kinntaey.github.io/posts/DREAMHACK-IMAGE-STORAGE/" /> <author> <name>Taehee Kim</name> </author> <category term="CTF Writeup" /> <category term="Web Hacking" /> <summary>Overview The application provides a file upload feature with no restriction on file type or extension. Since uploaded files are stored in a web-accessible directory, a PHP file can be uploaded and executed directly through the browser. Solution Step 1 — Identify the Vulnerability The upload endpoint accepts any file without validating the extension or MIME type. This means a .php script w...</summary> </entry> <entry><title>[Study Note] File Upload Vulnerabilities</title><link href="https://kinntaey.github.io/posts/STUDY-NOTE-FILE-UPLOAD/" rel="alternate" type="text/html" title="[Study Note] File Upload Vulnerabilities" /><published>2026-03-20T10:27:00+11:00</published> <updated>2026-03-20T10:27:00+11:00</updated> <id>https://kinntaey.github.io/posts/STUDY-NOTE-FILE-UPLOAD/</id> <content type="text/html" src="https://kinntaey.github.io/posts/STUDY-NOTE-FILE-UPLOAD/" /> <author> <name>Taehee Kim</name> </author> <category term="Study Note" /> <category term="Web" /> <summary>File Upload Vulnerabilities Purpose: File upload functionality is one of the most common features in web applications — and one of the most dangerous when implemented carelessly. This note covers how these vulnerabilities work, how attackers exploit them, and how to defend against them. 1. What Are File Upload Vulnerabilities? File upload vulnerabilities occur when a server accepts use...</summary> </entry> <entry><title>[Study Note] Privacy-Preserving Record Linkage (PPRL) &amp; ML Attacks</title><link href="https://kinntaey.github.io/posts/STUDY-NOTE-AI-SECURITY/" rel="alternate" type="text/html" title="[Study Note] Privacy-Preserving Record Linkage (PPRL) &amp;amp; ML Attacks" /><published>2026-03-07T15:00:00+11:00</published> <updated>2026-03-21T09:50:28+11:00</updated> <id>https://kinntaey.github.io/posts/STUDY-NOTE-AI-SECURITY/</id> <content type="text/html" src="https://kinntaey.github.io/posts/STUDY-NOTE-AI-SECURITY/" /> <author> <name>Taehee Kim</name> </author> <category term="Study Note" /> <category term="AI" /> <summary>What is Privacy-Preserving Record Linkage? (PPRL) PPRL is a technique for matching records about the same individuals across different databases — without exposing their private data. How it works 1. Two separate databases exist A Hospital DB with patient info (name, age, pressure, etc.) A Bank DB with financial info (name, DOB, loan type, etc.) 2. Encode Instead of sharing raw pe...</summary> </entry> </feed>
