Exploit 500 is the final exploitation challenge for CSAW CTF. It looks like a game asking questions. You get 2 tries per question. .text:08048CF7 buffer1 = byte ptr -4B4h .text:08048CF7 buffer2 = byte ptr -438h .text:08048CF7 answer = […]
We have a binary with a format string vulnerability: $ nc localhost 23456 What would be the last word you want say before the Mayan Calender ends? Saying: %p %p %p %p Starting count down to the end of the world! 5 4 3 2 […]
We have an interesting binary that uses signals to call functions. The most interesting handler is the user input handler: (function names are my own, binary was stripped) .text:080488C8 inputHandler proc near ; DATA XREF: sub_8048A3D+2Bo .text:080488C8 .text:080488C8 s […]
In this challenge, we need to get administrator credential on someone’s site who loves cat, ajax and getting contact emails. A robot will visit any link you post in the contact form, this robot is at the same time logged in the site’s administrator account.
In this challenge, we get an archive with an encrypted file and an executable that was used to encrypt it. We have to decrypt this file to get the key.