Capture the Flag Portfolio 🎄🏴‍☠️

Welcome to my CTF portfolio! Here I showcase some of the cybersecurity challenges I've conquered and the creative solutions I devised. In particular, you’ll find highlights from the SANS Holiday Hack Challenges in 2015 and 2014, where I earned special recognition for my solutions.

SANS Holiday Hack Challenge 2015 – “Gnome in Your Home”

In 2015, I solved all the technical challenges of the Holiday Hack A Hacker’s Holiday event, which earned me a Super Honorable Mention for creativity. I approached the challenges by thinking outside the box – for example, exploiting an IoT "Gnome" device and analyzing its network traffic in unexpected ways.

Interested in the detailed tech details? SANS Holiday Hack Tech Breakdowns

**Technical Breakdown (2015)** – *Click to expand*

Challenge Synopsis: The 2015 challenge involved an IoT elf gnome (“Gnome in Your Home”) that players had to investigate. I reverse-engineered firmware to uncover hidden features and analyzed network packets between the gnome and Santa’s servers.

Key Techniques Used:

Notable Findings: I creatively repurposed a firmware update mechanism to inject my own code, effectively turning the gnome against the challenge infrastructure (harmlessly, as part of the game). This novel method impressed the judges and demonstrated a real-world attack scenario.

SANS Holiday Hack Challenge 2014 – Most Creative Winner

The 2014 challenge had a story centered around Charles Dickens’ A Christmas Carol, with a cyber twist. I won the Most Creative Technical category for this competition by crafting an imaginative narrative-style report and solving challenges in unique ways.

Interested in the detailed tech details? SANS Holiday Hack Tech Breakdowns

**Technical & Creative Highlights (2014)** – *Click to expand*

Challenge Synopsis: The 2014 Holiday Hack featured scenarios where I had to help “Ebenezer Scrooge” secure his network after encounters with various holiday ghosts (each ghost presented a security challenge). I solved puzzles ranging from cryptography to web exploitation.

Creative Approach: My submission was presented as a story—writing my report as if I were narrating Scrooge’s overnight adventure in a novella format. Within the story, I embedded the technical solutions (e.g., decoding a malicious ELF file from “Ghost of Christmas Yet-to-Come” as part of the plot). This storytelling approach stood out.

Technical Tricks:

Outcome: By blending a fictional narrative with solid technical execution, I impressed the judges and secured the Most Creative award in 2014.