code hacking, zen coding

How to have a great NDH2k13 CTF

How to have a great NDH2k13 CTF

I competed last week-end in La Nuit Du Hack Private CTF, the one where you needed to quality in the prequals first. Being a positive person and not willing to discard efforts that were already made this year to sort out this CTF, this is a short list of points […]

Share

PlaidCTF 2012 – Password Guessing 300 – Encryption Service Writeup

PlaidCTF 2012 – Password Guessing 300 – Encryption Service Writeup

We found the source code for this robot encryption service, except the key was redacted from it. The service is currently running at 23.21.15.166:4433 #!/usr/bin/python import os import struct import SocketServer from Crypto.Cipher import AES ENCRYPT_KEY = ‘xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx’.decode(’hex’) # Character set: lowercase letters and underscore PROBLEM_KEY = ‘xxxxxxxxxxxxxxxxxxxxxxxxxxxxx’ BLOCK_SIZE = […]

Share

Insomni’hack 2012 reverse_me.bin Write-up

Insomni’hack 2012 reverse_me.bin Write-up

We have a binary $ file reverse_me.bin reverse_me.bin.back: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, corrupted section header size $ readelf -l reverse_me.bin Elf file type is EXEC (Executable file) Entry point 0x8048054 There are 1 program headers, starting at offset 52 Program Headers: Type Offset […]

Share

Insomni’hack 2012 Network PCAP Write-ups

Insomni’hack 2012 Network PCAP Write-ups

In this challenge we 2 files: 1 PCAP, 1 Python The PCAP file contains a dialog between a client and server that goes like this: > = client to server < = server to client > 8e67bb26b358e2ed20fe552ed6fb832f397a507d:3daf723376f823eceeb314c8fa60e47b1ba23633 < 5f367ff47fff772986cca54219fa167175353dc7 > 78be5fe51f264a4067463bad57022348 < 3290452b9a9f6d18523347dd1daa54a1e09195a7 > 94817a6b1d833e1ffb4fcb2aa7dd14143dc5759e>_

Share