Balsn

a CTF team from Network Security Lab of National Taiwan University

CTFtime ranking Read our writeups Team members Contact us

Balsn

Balsn is CTF team from Taiwan founded in 2016. Most of our current members are affiliated with Network Security Lab in National Taiwan University. We actively participate in online and onsite CTF competitions. You can browse our recently participated events and rankings on CTFtime. We also publish writeups on CTF challenges.

We are a group of cybersecurity enthusiasts interested in various areas including software security, web security, cryptography, IoT security, and etc. Besides our own research, all of us enjoy playing CTF because we believe it is an excellent chance to hone our skills in practice, catch up with the latest trend, and most importantly – compete and have fun!

In 2018 summer, Balsn attended DEFCON 26 CTF World Final in Las Vegas as a joint team BFS. BFS consists of 4 different CTF teams from Taiwan, including Balsn, BambooFox, DoubleSigma and KerKerYuan. We are so proud to rank 12th place in such a great competition.

Team Members

Active Memebers

sces60107
Current leader of Balsn. sces60107 (a.k.a Shaman King) knows nothing about reverse engineering and binary exploit, but he knows how to get the flag. This guy specializes in mind-reading and guessing the flag.
sasdf
Yet another Shaman King of Balsn. He focuses on all kinds of challenges.
bookgin
He mainly focus on web, forensics and misc challenges. He’s also in charge of infrastructure tasks when playing attack/defense CTF.
- Blog: https://bookgin.tw
- GitHub: bookgin
kevin47
(。>_ŏ)▄︻̷̿┻̿═━一
how2hack
Give me flag (・ω・)
qazwsxedcrfvtg14
Warning: He is a dangerous guy. Everything he touched will malfunction in a jiffy.
shw
Blog: https://x9453.github.io/
fweasd
I love CTFs, but they don’t like me…
mainly studied in pwn and crypto
RB363
A normal student interesting in all hacker things. Now sharpening his skills on web exploitation.
YY
A student who interested in binary analysis and like to PWN everything.
lingling
She is a reverse engineer. She reverses what she is interested in and figures out how it does what it does. (especially for Windows OS). Her interests also include Malware Research and Threat Intelligence.
Blog: 0x00.tw
Twitter: @0x000050
cli4125
A very beginner who interest in pwn and reverse engineering. Now study in NTU-EECS.
pone
pone!

Honorary Members

Isaac
> “This might be a game, but it isn’t something you play.”
Blog: https://poning.me
ysc
Transfer from pwn to web. Often got a production boost at the last hour of a game.
Blog: https://ysc21.github.io
lwc
Solve the challenges ranging from pwn to crypto, from crypto to bruteforce, from butefore to guessing, from guessing to ESP…
lsc
is my waifu.
bbiiggppiigg
( The challenge I can solve ) ≡ ( The challenge which is too easy )
Xinra
> “Every challenge is brute-forceable if you believe in yourself.”
For me, 500 500 CAPTCHAs are just an hour of human work.
ymk
Welcome to the world of CTF.
laurice
A girl studies in computer science and interested in classical music.
She has absolute pitch and used the ability to decode music in D-CTF final. She is now focusing on the area of machine learning.

Contact

Please contact us at balsn2015 [at] gmail [dot] com. You can write the mail in Chinese, English or Taiwanese.

If you have any question regarding our writeups, please feel free to create an issue in the writeup repository.


This website is hosted on GitHub Pages. Please refer to GitHub’s privacy statement for more information.