code hacking, zen coding

GiTS 2013 CTF – Question 17 Trivia 400 – Folly – Level 2 x86 chroot (getdents shellcode)

GiTS 2013 CTF – Question 17 Trivia 400 – Folly – Level 2 x86 chroot (getdents shellcode)

folly-b2632babf6ce9c2378630e364150ee2c84f47b73: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.26, stripped Folly was a multi-level challenge from the Ghost In The Shell Code CTF. This Write-up is for Level 2 based on the X86 architecture. It’s a sample text-game like this: $ […]

Share

GiTS 2013 CTF – Pwnable 100 Question 5 – FunnyBusiness

GiTS 2013 CTF – Pwnable 100 Question 5 – FunnyBusiness

funnybusiness-fb84813ddd932f6aceee0ed3a4e9f1e0a7082dc1: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.24, stripped After reversing this ELF32 binary, when we reconstruct the following connection handler: int __cdecl handler(int sock_fd) {   int z_code;   char zlib_input_buffer;   strm.zalloc = 0;   strm.zfree = 0; […]

Share

HackYouToo CTF – Crypto 300 – Everybody Lies

HackYouToo CTF – Crypto 300 – Everybody Lies

Mr. Menhall has invented his own encryption algorithm and promised to give the flag to anyone who manages to decipher the message: vWsMajX21l6BdKwDxaRA3utqhpvFL0V= def hashcrypt(msg, key):     token = hashlib.sha1(key).digest()     res = ""     for c in msg:         n = ord(c) ^ […]

Share

HackYouToo CTF – Crypto 500 – AllahAkbar

HackYouToo CTF – Crypto 500 – AllahAkbar

We were able to intercept a suspicious file. This is an archive of correspondence between leading cryptographers of hostile organization. According to the agents’ data, during the conversation one of the respondents accidentally uses a file that is added as trusted to all computers of the organization. Their antivirus software […]

Share