>_ Personal blog by Youssef Ben Hsan
Low-level exploitation, CTF writeups, pwn challenge design, and cybersecurity education. I break things to understand them — then teach others how to do the same.
I'm Youssef Ben Hsan, a student and self-taught researcher focused on low-level systems and offensive security. My work sits at the intersection of binary exploitation, challenge design, and education.
I design hands-on pwn challenges from scratch — writing vulnerable C programs, containerizing them with Docker, building solvers, and documenting every layer so others can learn from the process, not just copy the answer.
Beyond exploitation, I'm driven to make cybersecurity education accessible in Tunisia: from teaching kids online safety fundamentals to coaching baccalaureate students through their informatics exams.
I authored and deployed 8 binary exploitation challenges for CyberQuest Enet'com. Each is fully containerized, ships with vulnerable C source, a working exploit script, and a step-by-step writeup detailing the vulnerability and exploitation path.
| # | Challenge | Difficulty | Category |
|---|---|---|---|
| 01 | Blessing Registry Hack | Easy | Pwn |
| 02 | Iftar Rush Registration | Easy | Pwn |
| 03 | The Secret Iftar Recipe | Medium | Pwn |
| 04 | Ramadan Event Hijack | Medium | Pwn |
| 05 | The Moving Masjid | Hard | Pwn |
| 06 | The Ramadan Journey's End | Hard | Pwn |
| 07 | Shell Injection | Medium | Pwn |
| 08 | Bloody Null Bytes | Medium | Pwn |