This binary asks for a number and a string and outputs it. While playing with value, we notice a negative number for the number will crash the program. $ nc 58.229.122.22 6666 Input Num : 32 Input Msg : TOTO Reply : ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`TOTO $ nc 58.229.122.22 6666 Input Num : […]
Category: CTF
GiTS 2013 CTF – Pwnables 250 Question 10 – Back2skool Write-up
back2skool-3fbcd46db37c50ad52675294f566790c777b9d1f: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.24, stripped This is the binary for MathServ, “The one-stop shop for all your arithmetic needs”. $ nc localhost 31337 __ ___ __ __ _____ / |/ […]
GiTS 2013 CTF – Trivia 400 Question 17 – Folly Level 3 ARM Write-up
GiTS 2013 CTF – Question 17 Trivia 400 – Folly – Level 2 x86 chroot (getdents shellcode)
folly-b2632babf6ce9c2378630e364150ee2c84f47b73: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.26, stripped Folly was a multi-level challenge from the Ghost In The Shell Code CTF. This Write-up is for Level 2 based on the X86 architecture. It’s a sample text-game like this: $ […]
GiTS 2013 CTF – Pwnable 100 Question 8 – Shiftd
shiftd-3a9c2a55e77d1467ee46dfb931170c737d24f310: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.24, stripped Shiftd is an interesting X86_64 challenge combining information leak and exploitation. There is an hard-coded password for access to the service, then the binary asks you for your name and how you […]
GiTS 2013 CTF – Pwnable 100 Question 5 – FunnyBusiness
funnybusiness-fb84813ddd932f6aceee0ed3a4e9f1e0a7082dc1: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.24, stripped After reversing this ELF32 binary, when we reconstruct the following connection handler: int __cdecl handler(int sock_fd) { int z_code; char zlib_input_buffer; strm.zalloc = 0; strm.zfree = 0; […]
Atast CTF – Gadget – IDA static analysis PIC16F Blinker Write-Up
29C3 CTF – Exploitation 200 – ru1337 write-up
Description Are you 31337? Get your credentials checked here 94.45.252.242:1024 $ nc 94.45.252.242 1024 ID&PASSWORD 1337NESS EVALUATION Please enter your username and password User: aXs Password: toto u r not s0 1337zz!!! After some work in your favorite debugger, we can work with the reversing of our little binary: char […]
HackYouToo CTF – Crypto 300 – Everybody Lies
HackYouToo CTF – Crypto 500 – AllahAkbar
We were able to intercept a suspicious file. This is an archive of correspondence between leading cryptographers of hostile organization. According to the agents’ data, during the conversation one of the respondents accidentally uses a file that is added as trusted to all computers of the organization. Their antivirus software […]