Writeup: JMP Custom Protocol - EspilonCTF (ESP) Paid Members Public
Challenge Description The CERT-CORP intercepted a strange firmware from an unknown router model built by the shady Jnouned Company. Analysts found it targets an ESP32-based prototype, but the system is protected by a locked UART console. Your mission: flash the firmware, break into the system, and unlock admin access. Category:
Writeup: Admin Panel - EspilonCTF (ESP) Paid Members Public
Challenge Description The CERT-CORP intercepted a strange firmware from an unknown router model built by the shady Jnouned Company. Analysts found it targets an ESP32-based prototype, but the system is protected by a locked UART console. Your mission: flash the firmware, break into the system, and unlock admin access. Category:
Writeup: 802.11 is jnouned - EspilonCTF (ESP) Paid Members Public
Challenge Description The CERT-CORP intercepted a strange firmware from an unknown router model built by the shady Jnouned Company. Analysts found it targets an ESP32-based prototype, but the system is protected by a locked UART console. Your mission: flash the firmware, break into the system, and unlock admin access. Category:
Writeup: Jnouned Routeur - EspilonCTF (ESP) Paid Members Public
Challenge Description The CERT-CORP intercepted a strange firmware from an unknown router model built by the shady Jnouned Company. Analysts found it targets an ESP32-based prototype, but the system is protected by a locked UART console. Your mission: flash the firmware, break into the system, and unlock admin access. Category:
Writeup: Hello-ESP - EspilonCTF (ESP) Paid Members Public
Challenge Overview FieldDetailsNameHello ESPCategoryReverse Engineering / FirmwarePlatformESP32 (Xtensa LX6)Flag FormatESPILON{...} Flag ESPILON{st4rt_th3_w1r3} Files Provided FileSizeDescriptionbootloader.bin26,752 BESP32 bootloaderpartition-table.bin3,072 BPartition tablehello-espilon.bin178,848 BMain application firmware Solution Walkthrough Step 1: Initial Recon Extracted HELLO-ESP.zip to obtain three .bin files and a README with flashing
Writeup: The Wired - EspilonCTF (Intro) Paid Members Public
Overview We're given access to a machine that administered a fleet of ESP32-based agents running a custom C2 framework called ESPILON. The agents communicate with a coordinator over TCP using encrypted protobuf messages. Our goal is to impersonate an agent, complete the authentication handshake, and retrieve the flag
Security Theatre — Ilusi Keamanan yang Lebih Berbahaya dari Serangan Itu Sendiri Paid Members Public
Security Theatre — Ilusi Keamanan yang Lebih Berbahaya dari Serangan Itu Sendiri **Meta Description**: Security theatre adalah aktivitas keamanan yang terlihat meyakinkan tapi tidak mengubah postur risiko. Pelajari cara mengenali dan menggantinya dengan pertahanan nyata. **Author**: Harjulianto **Published**: 2026-02-25 **Category**: Cybersecurity, Leadership **Tags**: security theatre, ilusi keamanan, compliance, risk management TL;