Have you tried feeding critical documents to a shredder? We’ve accidentally done this very thing. Shredder: shredder.exe Document remains: broken_flag.jpg We need our document back! See: http://hackyou.ctf.su/tasks/shredder Shredder is a Win32 binary that encrypt source file “flag.jpg” to “broken_flag.jpg”. The encryption is only some translations and swaps and can be […]
PHDays CTF Quals – Pwn300 SouthPark Write-Up – Python byte-code version
RuCTFE 2012 CTF – LuST Service Writeup
RuCTFE is “classic” (these days it’s more like “old-skool”) Attack/Defense security game where multiple teams (150) compete to hack each other vulnerable services hosted in a VirtualBox machine provided by the CTF organizers at the beginning of the contest. Read more here about this great CTF and the network setup: […]
Hack.lu CTF – Python Jail Writeup
Challenge source code: #!/usr/bin/env python ”’ Running instructions. sockets are insecure. We do not implement any socket behaviour in this file. Please make this file +x and run with socat: socat TCP-LISTEN:45454,fork EXEC:./chal.py,pty,stderr Debugging: Just execute chal.py and play on terminal, no need to run socat Note: This […]
GreHack 2012 – Web100 (python daemon) Writeup
HackYou CTF – PPC 200 – Oscaderp Forensic Writeup
HackYou CTF – Epic Arc 300 – CTF.EXE Writeup
HackYou CTF – Web 300 – RNG of Ultimate Security Writeup
Web challenge. We have the “source code” and we know the location of the flag: <!– can’t touch this: http://securerng.misteryou.ru/flag.txt.gz –> <!– can touch this: http://securerng.misteryou.ru/index.php.txt –> The web page is simple form to generate pseudo-random numbers. Here is the form: <form method=’POST’> Enter the […]