cryptoPromedium
Firewall
uoftctf2026
Task: Web server behind an eBPF/TC firewall that blocks packets containing "flag" or "%" with per-packet stateless inspection. Solution: Bypassed the ingress filter by splitting "flag" across two TCP segments using TCP_NODELAY, and bypassed the egress filter by requesting the file in 3-byte HTTP Range chunks (smaller than the 4-byte blocked pattern).
$ ls tags/ techniques/
tcp_segmentation_bypasshttp_range_requestpacket_filter_evasion
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [network][free]offknock— umdctf
- [forensics][Pro]exFill— grodno_new_year_2026
- [pwn][free]0xDiablos— hackthebox
- [network][Pro]First Nightmare— grodno_new_year_2026
- [web][Pro]After Image— srdnlen