hack.lu CTF 2011 Spy Aboard! (300)

Category: crypto

We have a spy aboard! For around 5 minutes ago we intercepted an encrypted transmission to an enemy outpost. It seems like we interrupted the mole in the act because we found an open transmission program on our terminals. We are 100% sure that he sent the position of our fleet to the outpost to plan an attack against us. Our position due the transmission was:

position: Harcon System , Planet Crematoria , x: 129.23432231423 degrees y: 111.13442353423 degrees , z: 100,13142234423 degrees

We need the spies autorization code to prevent this attack. You as our crypto expert you have to find it! The survival of 10000 brave men, women and children depends on you!!!
GOOD LUCK!

download

Summary: ElGamal Diffie-Hellman, bad protocol usage, known plaintext attack

Continue reading

hack.lu CTF 2011 Simplexor (200)

Category: crypto

To get a better security we deceided to encrypt our most secret document with the secure xor-algorithm. Unfortunately we lost the key. Now we are sad. Can you help us recovering the key?

Download

Summary: recovering multibyte xor-key, using autocorrelation

Continue reading

hack.lu CTF 2011 Antique Space Shuttle (300)

Category: exploiting

Your command is to get as much information about the crew of an antique space shuttle. We know our acient father used finger as reference point at

nc ctf.hack.lu 2003

Summary: bash injection, and buffer overflow on a suid binary to get more privilegies

Continue reading

hack.lu CTF 2011 Space Station 0xB321054A (300)

Category: exploiting

You have seen a deserted space station. Your task is to enter it. The first barrier is the access system. But you can find a module with the application on it. Here is the file:

download

What is the key?

(There is also station A, but station B is the advanced one.)

Summary: patching smali code for debug output

Continue reading

DEFCON 19 Final – hiver

This challenge was on logic and understanding of the bloom filter. The binary is for FreeBSD.

binary

Summary: understanding of the bloom filter, bruteforce bloom filter set.

Continue reading

DEFCON 19 Final – forgetu

This challenge was on remote exploiting. The binary is for FreeBSD.

binary

Summary: bruteforce password, buffer overflow, jump to shellcode

Continue reading

Team IV took 4th place in the DEFCON 19 CTF FINAL

LeetMore in the Team IV took 4th place in the DEFCON 19 CTF FINAL!
Congratulations guys! This is definitely a great achievement!
Proof: http://ddtek.biz

Team IV afterparty!

You can find all photo in our album

Defcon 19

You can find all photo in our album

Lockpicking in Las Vegas

You can find all photo in our album

LeetMore have a fun in Los Angeles

You can find all photo in our album

LeetMore at XSS Night Club

leetmore checking out vegas night clubs

Leet More at BlackHat’11

giving a talk about physical perimeter security

0day airplane terminal sploit (no disclosure)

NdH2k11 WaRgam3 – CrackMe 400 (2000pts). Part 2

It is second part of CrackMe task describing. First one you can find there

In this part I will detail the analysis of driver ReverMe1.sys

Continue reading