Author's posts

iCTF 2011. Challenge 32 ($ ?)

Program is not packed x86 executable ELF file. There is a very easy logic here. Secret information about bank account is generated from input code.

Continue reading

iCTF2011. Challenge 33 ($100)

There is file “reverse5”, but if you look at that, you don’t see executable file at all. It is some “binary trash”. Size is 991117 bytes and it looks like a packed one (large entropy).

Continue reading

The significant game, but EPIC FAIL! 2th on iCTF 2011

First of all, big thanks for UCSBiCTF !  It was really GREAT game!There are good task and services! We played as More Smoked Leet Chicken (Leet More + Smoked Chicken) and It was the best game of those that I remember! We have done a lot of tasks (most of all, if I’m not mistaken), had a lot of fun! But had …

Continue reading

EnoWars CTF – GTFO (300 Pts)

Category: reverse, network While trying to figure out how to leave, you notice some Rhynchodos millenios. It’s really surprising to see one of those. Remember that documentary they had on Discovery Channel? They were pretty much the cheapest ships you could get. And they sucked. Big time. Being built with the cheapest materials around and …

Continue reading

EnoWars CTF – Invaders 100 pts

Are you ready to fight? Jedimaster: We can’t afford to wait any longer. Energy I’ll use to defeat their spaceships and clear the way for our troops. Just me give a figher EnoInvaders.tar.gz Hash Summary: packet analyze, a little reverse

Continue reading

rwth2011 CTF – ps3game

This service was on exploiting, understanding udp protocol and process of sign data. ps3game files Summary: reversing, crypto, rsa, tea hash, udp sign

Continue reading

Xakep Magazine. Defcon 19 CTF Report

Today October 10 (153) 2011  Xakep (“Hacker”) magazine issued with our (team IV) Defcon CTF report. Full article you can find when you buy the magazine.

hack.lu 2011 First Pre-CTF challenge

Category: reversing binary Summary: hash algorithm analyze, crackme

Continue reading

hack.lu CTF 2011 FluxScience (450)

Category: reversing Thanks to a former employee of FluxScience (one of our competitors), we managed to get hands on some important files which might help us revealing company secrets. Attached you will find the files. The employee who provided them got fired. You might be lucky and find his account still working: FLUX-38B273DD75860083-0B3DD6B02EC5B9B1-4AFFBAC2EB8B4D17 He might …

Continue reading

DEFCON 19 Final – hiver

This challenge was on logic and understanding of the bloom filter. The binary is for FreeBSD. binary Summary: understanding of the bloom filter, bruteforce bloom filter set.

Continue reading

DEFCON 19 Final – forgetu

This challenge was on remote exploiting. The binary is for FreeBSD. binary Summary: bruteforce password, buffer overflow, jump to shellcode

Continue reading

Team IV took 4th place in the DEFCON 19 CTF FINAL

LeetMore in the Team IV took 4th place in the DEFCON 19 CTF FINAL! Congratulations guys! This is definitely a great achievement! Proof: http://ddtek.biz

Team IV afterparty!

You can find all photo in our album

Defcon 19

You can find all photo in our album

Lockpicking in Las Vegas

You can find all photo in our album