I competed last week-end in La Nuit Du Hack Private CTF, the one where you needed to quality in the prequals first. Being a positive person and not willing to discard efforts that were already made this year to sort out this CTF, this is a short list of points […]
About: aXs
Posts by aXs:
PlaidCTF 2012 – Pwnables 300 – Chest Writeup
PlaidCTF 2012 – Password Guessing 300 – Encryption Service Writeup
We found the source code for this robot encryption service, except the key was redacted from it. The service is currently running at 23.21.15.166:4433 #!/usr/bin/python import os import struct import SocketServer from Crypto.Cipher import AES ENCRYPT_KEY = ‘xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx’.decode(’hex’) # Character set: lowercase letters and underscore PROBLEM_KEY = ‘xxxxxxxxxxxxxxxxxxxxxxxxxxxxx’ BLOCK_SIZE = […]
PlaidCTF 2012 – Potpourri 100 – The Game Writeup
Robots enjoy some strange games and we just can’t quite figure this one out. Maybe you will have better luck than us. 23.22.16.34:6969 We have a game running on that port: You have gotten 0 of 75 Choice 1 = 98d00c65d341be04600f915b32c01c81ab Choice 2 = 7a859a01731c050797ac952d82b895882a Which one is bigger? (1 […]
PlaidCTF 2012 – Practical Packets 200 – Torrents Writeup
PlaidCTF 2012 – Practical Packets 250 – 80s Thinking Writeup
NDH 2012 Prequals – Sciteek 4004 Write-up – Multistage file reader
NDH 2012 Prequals – Sciteek 4005 Web3 Write-up
Insomni’hack 2012 reverse_me.bin Write-up
We have a binary $ file reverse_me.bin reverse_me.bin.back: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, corrupted section header size $ readelf -l reverse_me.bin Elf file type is EXEC (Executable file) Entry point 0x8048054 There are 1 program headers, starting at offset 52 Program Headers: Type Offset […]
Insomni’hack 2012 Network PCAP Write-ups
In this challenge we 2 files: 1 PCAP, 1 Python The PCAP file contains a dialog between a client and server that goes like this: > = client to server < = server to client > 8e67bb26b358e2ed20fe552ed6fb832f397a507d:3daf723376f823eceeb314c8fa60e47b1ba23633 < 5f367ff47fff772986cca54219fa167175353dc7 > 78be5fe51f264a4067463bad57022348 < 3290452b9a9f6d18523347dd1daa54a1e09195a7 > 94817a6b1d833e1ffb4fcb2aa7dd14143dc5759e>_