Ronak Badhe

@r2dev2

Hi! I'm a developer and hacker (the cybersecurity kind) at UCLA. - CTFs with PBR | UCLA - write web challenges for LaCTF - https://github.com/r2dev2/CTF

Joined on Sep 17, 2023

  • Hi! I'm r2uwu2 from PBR | UCLA. This is the second LA CTF I have written challenges for. This year, I primarily wrote web and a few misc challenges. Here are some writeups for the harder challenges I wrote. Misc Farquaad ui Today, we're taking a journey to the Kingdom of Far Far Away. It is a special day, for Lord Farquaad is executing today!
     Like 1 Bookmark
  • Writeup by r2uwu2 from PBR | UCLA (as part of SuperDiceCode) A fresh web scale Key Value Store just for you 🥰 Solves: 8 Points: 588 Challenge We are given a go http server. Upon requesting to the server, a "frontend" assigns us a session id. It then starts a unique Key-Value (KV) store service corresponding to the session id and proxies our traffic to the service.
     Like  Bookmark
  • Writeup by r2uwu2 from PBR | UCLA A safe Python calculator in a non-bypassable sandbox. Solves: 33 Points: 246 Challenge We are given no source and the nc connection pycalc.2024.ctfcompetition.com 1337.
     Like  Bookmark
  • Writeup by r2uwu2 Upload your files on the Kalmar File Store and share them with your friends. Challenge We are given a relatively simple flask application. We can upload an image by clicking Upload Image. upload
     Like  Bookmark
  • Writeup by r2uwu2 I wrote my own HTTP server. I have to admit: the code is a bit cursed, but it works! So no problem, right? image Application Looking at the first request to the server, image
     Like  Bookmark
  • Every CTF requires at least one overly complicated notes app. Author: Z_Pacifist 18th solve - r2uwu2 @ PBR | UCLA Initial Glee When I first took a look at this challenge with my teammate Benson Liu (the bizzler), we thought we found the vulnerability. image image
     Like 1 Bookmark