Gadget was an electronic challenge at the Atast CTF. You get a schematic design for ISIS and .hex file for the PIC16F CPU. I choose to use the evaluation version of PIC Simulator just to visualize what this design was about: When you run the program, the 8 LEDs will […]
Month: December 2012
29C3 CTF – Exploitation 200 – ru1337 write-up
Description Are you 31337? Get your credentials checked here 94.45.252.242:1024 $ nc 94.45.252.242 1024 ID&PASSWORD 1337NESS EVALUATION Please enter your username and password User: aXs Password: toto u r not s0 1337zz!!! After some work in your favorite debugger, we can work with the reversing of our little binary: char […]
HackYouToo CTF – Crypto 300 – Everybody Lies
HackYouToo CTF – Crypto 500 – AllahAkbar
We were able to intercept a suspicious file. This is an archive of correspondence between leading cryptographers of hostile organization. According to the agents’ data, during the conversation one of the respondents accidentally uses a file that is added as trusted to all computers of the organization. Their antivirus software […]
HackYouToo CTF – Binary 300 – Shredder Write-up
Have you tried feeding critical documents to a shredder? We’ve accidentally done this very thing. Shredder: shredder.exe Document remains: broken_flag.jpg We need our document back! See: http://hackyou.ctf.su/tasks/shredder Shredder is a Win32 binary that encrypt source file “flag.jpg” to “broken_flag.jpg”. The encryption is only some translations and swaps and can be […]