cryptomedium

Firewall

uoftctf2026

Task: Web server behind an eBPF/TC firewall that blocks packets containing "flag" or "%" with per-packet stateless inspection. Solution: Bypassed the ingress filter by splitting "flag" across two TCP segments using TCP_NODELAY, and bypassed the egress filter by requesting the file in 3-byte HTTP Range chunks (smaller than the 4-byte blocked pattern).

$ ls tags/ techniques/
tcp_segmentation_bypasshttp_range_requestpacket_filter_evasion

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]