back2skool-3fbcd46db37c50ad52675294f566790c777b9d1f: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.24, stripped This is the binary for MathServ, “The one-stop shop for all your arithmetic needs”. $ nc localhost 31337 __ ___ __ __ _____ / |/ […]
Month: February 2013
GiTS 2013 CTF – Trivia 400 Question 17 – Folly Level 3 ARM Write-up
GiTS 2013 CTF – Question 17 Trivia 400 – Folly – Level 2 x86 chroot (getdents shellcode)
folly-b2632babf6ce9c2378630e364150ee2c84f47b73: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.26, stripped Folly was a multi-level challenge from the Ghost In The Shell Code CTF. This Write-up is for Level 2 based on the X86 architecture. It’s a sample text-game like this: $ […]
GiTS 2013 CTF – Pwnable 100 Question 8 – Shiftd
shiftd-3a9c2a55e77d1467ee46dfb931170c737d24f310: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.24, stripped Shiftd is an interesting X86_64 challenge combining information leak and exploitation. There is an hard-coded password for access to the service, then the binary asks you for your name and how you […]
GiTS 2013 CTF – Pwnable 100 Question 5 – FunnyBusiness
funnybusiness-fb84813ddd932f6aceee0ed3a4e9f1e0a7082dc1: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.24, stripped After reversing this ELF32 binary, when we reconstruct the following connection handler: int __cdecl handler(int sock_fd) { int z_code; char zlib_input_buffer; strm.zalloc = 0; strm.zfree = 0; […]