Dec
04

iCTF 2011. Challenge 29 ($800) Program is not packed x86 executable PE file. binary Dec 04 iCTF 2011. Challenge 30 ($500)

There is encrypted file “reverse2.7z.enc”. So if you look careful you see repeated pattern:

Dec
04

iCTF 2011. Challenge 31 ($?) Program is not packed x86 executable ELF file. There is a very easy logic here. Secret information about bank account is generated from input code. Dec 04 iCTF 2011. Challenge 32 ($ ?)

Program is not packed x86 executable ELF file. There is a very easy logic here. Secret information about bank account is generated from input code.

Oct
01

rwth2011 CTF – ps3game

This service was on exploiting, understanding udp protocol and process of sign data. ps3game files Summary: reversing, crypto, rsa, tea hash, udp sign

Sep
21

hack.lu CTF 2011 Space Station 0xB321054A (300)

Category: exploiting You have seen a deserted space station. Your task is to enter it. The first barrier is the access system. But you can find a module with the application on it. Here is the file: download What is the key? (There is also station A, but station B is the advanced one.) Summary:… Continue reading »

Jul
25

NdH2k11 WaRgam3 – CrackMe 400 (2000pts). Part 2

It is second part of CrackMe task describing. First one you can find there In this part I will detail the analysis of driver ReverMe1.sys

Jun
06

Defcon CTF Quals 2011 – Pwnables 400

This challenge was on remote exploiting. The binary is for Linux, statically linked and stripped. binary Summary: overflow, ROP for execve(“/bin/sh”)

Mar
09

Codegate CTF 2011 Vuln 300

This challenge was an exploitation of suid binary. binary Summary: ROPing buffer overflow with NX and ASLR

Mar
08

Sep
21

Leet More 2010 brainfffuuuuu writeup

Category: CTB This binary is running at ctf.ifmo.ru Are you able to get the key?! Let’s take a look at what the binary is doing (decompilation of its main function begin_the_fucking() will help us): 1. Prints out some prompt 2. Reads 30 bytes 3. Interprets them as Brainfuck code. and here is what the stack… Continue reading »