text_chunk
stringlengths
0
17.1k
# Melek> ### Difficulty: Medium>> [Melek](https://cr.yp.toc.tf/tasks/melek_3d5767ca8e93c1a17bc853a4366472accb5e3c59.txz) is a secret sharing scheme that may be relatively straightforward to break - what are your thoughts on the best way to approach it? ## Solution```py#!/usr/bin/env sage from Crypto.Util.number import ...
# Honey> ### Difficulty: Medium>> [Honey](https://cr.yp.toc.tf/tasks/honey_fadbdf04ae322e5a147ef6d10a0fe9bd35d7c5db.txz) is a concealed cryptographic algorithm designed to provide secure encryption for sensitive messages. ## Initial analysis```py#!/usr/bin/env python3 from Crypto.Util.number import *from math import sq...
# nloads ChatGPT: "Why did the application break up with the dynamic library? Because every time they got close, it changed its address!" Don't break up. Get the flag. There is only one flag. nloads provides us with 13613 folders of binaries, each folder contains a `./beatme` binary that takes 8 bytes of input....
__Original writeup:__ <https://github.com/kyos-public/ctf-writeups/blob/main/insomnihack-2024/Pedersen.md> # The Challenge The goal was to find a collision in the Pedersen hash function (i.e., find distinct inputs that yield the same output). We had access to a running version of the code (a hashing oracle), as indicat...
from memory and a partial note. The web page contained a SQL injection. There was a condition to pass in order to go into the get results. if username != 'admin' or password[:5] != 'admin' or password[-5:] != 'admin': ...exit() This required username to be "admin"And it required that the password starts with admin [:5]...
We can see a shell ```$ cat with | vim/bin/bash: line 1: vim: command not found```And apparently the shell is stuck in a mode, where each command is prefixed by a 'cat' command of some file, which is piped to the command we are entering. For example, the command 'more' will result in the piped text to be printed on the...
We are thrown into a shell that adds the prefix 'wa' to each command line parameter. ``` _ _ __ __ __ __ _ | |__ __ _ ___ | |_ \ V V // _` | | '_ \ / _` | (_-< | ' \ \_/\_/ \__,_| |_.__/ \__,_| /__/_ |_||_| _|"""""|_|"""""|_|"""""|_|"""""|_|""...
Decompiled: ```C#include "out.h" int _init(EVP_PKEY_CTX *ctx) { int iVar1; iVar1 = __gmon_start__(); return iVar1;} void FUN_00101020(void) { // WARNING: Treating indirect jump as call (*(code *)(undefined *)0x0)(); return;} void FUN_00101050(void) { __cxa_finalize(); return;} void __stack_ch...
Attachments: * imagehost.zip In this zip file there is a python implementation of an imagehost web server.This implementation contains code for session handling via JSON Web Tokens:```pythonfrom pathlib import Path import jwt def encode(payload, public_key: Path, private_key: Path): key = private_key.read_bytes() retu...
Attachments: * dist.zip The dist.zip contains an index.js file with the following code:```javascriptconst express = require('express')const puppeteer = require('puppeteer');const cookieParser = require("cookie-parser");const rateLimit = require('express-rate-limit');require('dotenv').config(); const app = express()con...
> https://uz56764.tistory.com/124 ```pyfrom pwn import *import struct context.arch = "amd64" nan = struct.unpack("Q", struct.pack("d", float('nan')))[0] #r = process("dotcom_market")r = remote("dotcom.shellweplayaga.me", 10001 ) r.sendlineafter(b"Ticket please:", b"ticket{here_is_your_ticket}") r.sendlineafter(b"Enter ...
1. decompile the challenge binary file, easy to understand, nothing to say 1. In file backdoor.py found that: ```ctxt = (pow(g, int.from_bytes(ptxt, 'big'), n_sq) * pow(r, n, n_sq)) % n_sq``` because of : ```ctxt == (g ^ ptxt) * (r ^ n) mod n_sq=> ctxt^a == ((g ^ ptxt) * (r ^ n))^a mod n_sq=> ctxt^a == (g ...
# Full writeupA detailled writeup can be found [here](https://ihuomtia.onrender.com/umass-rev-free-delivery). # Summarized Solution- Decompile the apk using `jadx`- Extract a base64 encoded string from `MainActivity.java`, the string is `AzE9Omd0eG8XHhEcHTx1Nz0dN2MjfzF2MDYdICE6fyMa`.- Decode the string and then xor it ...
## Full WriteupA detailed writeup can be found [here](https://ihuomtia.onrender.com/umass-pwn-bench-225). ## Solve script```pythonfrom pwn import * def start(argv=[], *a, **kw): if args.GDB: # Set GDBscript below return gdb.debug([exe] + argv, gdbscript=gdbscript, *a, **kw) elif args.REMOTE: # ('server',...
We are provided with a png image. Using zsteg, we can analyze the png file.```zsteg -a her-eyes.png``` Looking at the zsteg results, we can see that there is some text hidden in zlib with 'b2,rgb,lsb,yx'.```b2,rgb,lsb,yx .. zlib: data="Her \xF3\xA0\x81\x8Eeyes \xF3\xA0\x81\x89stare \xF3\xA0\x81\x83at \xF3\xA0\x81...
# TaskThe challenge was a php webproxy and a Tomcat server (that was not directly accessible, only via the webproxy). The Tomcat server has the manager webapp deployed, and some configs, specially a user (including password) for the manager app. User/Passwort is just "admin".# SolutionThe Manager Tomcat App can be used...
## JumperWe get the source code zip and a link to a website. The website is a proxy that lets us visit other websites, based on a github repo that already existed. Looking at the source zip, we don't actually get a lot of source. It's simply a docker-compose deploying two containers: One with the `php-proxy` and one wi...
# web/Spongebobs Homepage> Welcome to this great website about myself! Hope you enjoy ;) DIRBUSTER or any similar tools are NOT allowed. There is a `#command-injection` in the `/assets/image` path in `size` query parameter. The size is passed on to the **convert-im6.q16** command. When I tried various command injection...
# web/b01ler-ad> Ads Ads Ads! Cheap too! You want an Ad on our site? Just let us know!`http://b01ler-ads.hammer.b01le.rs` XSS challenge - We are allowed to input any html data we want and the admin visits that but the content should not contain quotes, double quotes and backticks: Main challenge```js const content = r...
# Phreaky> In the shadowed realm where the Phreaks hold sway, A mole lurks within, leading them astray. Sending keys to the Talents, so sly and so slick, A network packet capture must reveal the trick. Through data and bytes, the sleuth seeks the sign, Decrypting messages, crossing the line. The traitor unveiled, with ...
# forens/An unusual sighting (? solves)> As the preparations come to an end, and The Fray draws near each day, our newly established team has started work on refactoring the new CMS application for the competition. However, after some time we noticed that a lot of our work mysteriously has been disappearing! We managed...
# It Has Begun> The Fray is upon us, and the very first challenge has been released! Are you ready factions!? Considering this is just the beginning, if you cannot musted the teamwork needed this early, then your doom is likely inevitable. We start with a `script.sh` containing some bash commands. ```bash#!/bin/sh if [...
# Urgent> In the midst of Cybercity's "Fray," a phishing attack targets its factions, sparking chaos. As they decode the email, cyber sleuths race to trace its source, under a tight deadline. Their mission: unmask the attacker and restore order to the city. In the neon-lit streets, the battle for cyber justice unfolds,...
## The Challenge ### Challenge Metadata The challenge got 89 solves, and I personally got the blood on this challenge! ? Here is the challenge description: > Caddy webserver is AWESOME, using a neat and compact syntax you can do a lot of powerful things, e.g. wanna know if your browser supports [HTTP3](https://http3.ca...
# Corruption> Can't seem to open the file. The file was corrupted with operations used through this application: (Link to cyberchef download). This challenge was a fair bit guessy in my opinion but the solution in the end was found. We start with a 'corrupted' file which was modified using CyberChef (attached via a dow...
# Forensics/Contracts> > Magical contracts are hard. Occasionally, you sign with the flag instead of your name. It happens. Given a PDF with the context that it was signed with the flag by accident, so looking into PDF extraction I find [`pdfly`](https://github.com/py-pdf/pdfly) which seems to have capabilities to extr...
# Intergalactic Cinema ## Description```I was partaking in a fun viewing of some show/movie with my alien bros but couldn't understand anything due to the alien voice dubbing present in the movie. I've managed to download a script of what was said during the viewing but it seems to be encrypted, can you help me decrypt...
# α’£β‘β•ŽΟŸ β•ŽΟŸ γƒͺα’·α–‹α’£ ## Description```We have reason to believe that Mortimer is rebuilding the Armageddon Machine. We managed to intercept a message sent from his personal computer. After consulting with the Oracle, we were only able to discover two things: The tool used to encrypt messages (encrypt.py)All messages sent by ...
# Slowly Downward ## Description```We've found what appears to be a schizophrenic alien's personal blog. Poke around and see if you can find anything interesting. http://slow.martiansonly.net``` ## Writeup Starting off, we can look at the `html` of the website. ```html <html lang="en"><head> <meta charset="UTF-8"> ...
# Space Heroes ATM Writeup ## IntroductionIn this writeup, we'll discuss the exploitation of the "Space Heroes ATM" challenge. The goal was to exploit a vulnerability in the provided binary to gain unauthorized access to the ATM and retrieve the flag. ## Initial AnalysisUpon analyzing the binary, we discovered that it ...
# Space Heroes Falling in ROP Writeup ## IntroductionIn this writeup, I'll explain the process of exploiting the "Space Heroes Falling in ROP" challenge in the Pwn category. The goal was to retrieve the flag by exploiting a vulnerability in the provided binary. ## Initial AnalysisFirst, let's analyze the binary. We not...
# Slowly Downward > We've found what appears to be a schizophrenic alien's personal blog. Poke around and see if you can find anything interesting.> > http://slow.martiansonly.net> > Author: liabell Solution: No source file(s) given...let's check the challenge site. ![image](https://raw.githubusercontent.com/pspspsps-c...
By opening the game from a terminal, it can be seen that the game has been developed with [Godot Engine](https://godotengine.org/), an open source game engine: ```Godot Engine v4.2.1.stable.custom_build - https://godotengine.orgOpenGL API 3.3.0 NVIDIA 517.48 - Compatibility - Using Device: NVIDIA - NVIDIA GeForce MX250...
![easy mergers](https://raw.githubusercontent.com/GerlachSnezka/utctf/main/assets/2024-web-easymergers.png) For this assignment, we had the page and code for this site. On the site, we can add fields and then create a company or edit it (absorb it). ![easy mergers web](https://raw.githubusercontent.com/GerlachSnezka/ut...
# PasswordGuesser THCON 2024 ## Challenge![password-guesser](passwordguesser.png) ## Understanding the challenge- The description suggests that there is a secret hidden in the source code of the password-guesser and secret is given when we give password.- There is also a file password-guesser.elf- Maybe we have to deco...
# SpaceNotes - THCON 2024 ## Challenge![Challenge](Challenge.png) ## Understanding the challenge ### Looking at the webpage ```chall.ctf.thcon.party:port/?username=base64encoded-string```- We have to retrive admin user notes.- Directly accessing through admin base64 encoded string gives an error maybe there are some ch...
"Employee Evaluation" In this challenge, we're presented with a script prompting us for input. /-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-\ | | | SwampCo Employee Evaluation Scriptβ„’ | | | ...
"Reptilian Server" For this challenge, we're presented with a target host and a `server.js` file: const vm = require('node:vm'); const net = require('net'); // Get the port from the environment variable (default to 3000) const PORT = process.env.PORT || 3000; //...
In this task, we need to find `flag.txt` by uploading the zip via the website. ![schrΓΆdinger](https://raw.githubusercontent.com/GerlachSnezka/utctf/main/assets/2024-web-schrodinger.png) Since in the task, there's that flag.txt is located in the home folder, it will probably be in `home/<user>/flag.txt` Although we don'...
> Surrounded by an untamed forest and the serene waters of the Primus river, your sole objective is surviving for 24 hours. Yet, survival is far from guaranteed as the area is full of Rattlesnakes, Spiders and Alligators and the weather fluctuates unpredictably, shifting from scorching heat to torrential downpours with...
```Welcome to The Fray. This is a warm-up to test if you have what it takes to tackle the challenges of the realm. Are you brave enough?``` ### Setup ```soliditypragma solidity 0.8.23; import {RussianRoulette} from "./RussianRoulette.sol"; contract Setup { RussianRoulette public immutable TARGET; constructor() p...
> Weak and starved, you struggle to plod on. Food is a commodity at this stage, but you can’t lose your alertness - to do so would spell death. You realise that to survive you will need a weapon, both to kill and to hunt, but the field is bare of stones. As you drop your body to the floor, something sharp sticks out of...
## misc / Stop Drop and Roll > The Fray: The Video Game is one of the greatest hits of the last... well, we don't remember quite how long. Our "computers" these days can't run much more than that, and it has a tendency to get repetitive... ```plaintext===== THE FRAY: THE VIDEO GAME =====Welcome!This video game is very ...
We are given `deals.xlsm` and it has a macro in it. ```vbSub AutoOpen()Dim RetvalDim f As StringDim t53df028c67b2f07f1069866e345c8b85, qe32cd94f940ea527cf84654613d4fb5d, e5b138e644d624905ca8d47c3b8a2cf41, tfd753b886f3bd1f6da1a84488dee93f9, z92ea38976d53e8b557cd5bbc2cd3e0f8, xc6fd40b407cb3aac0d068f54af14362e As Stringxc...
# UnholyEXE Remember, Terry zealously blessed the PCNet driver. ### Resources Used [ZealOS-wiki](https://zeal-operating-system.github.io/ZealOS-wiki/) [ZealOS Discord](https://discord.gg/rK6U3xdr7D) [Running the ZealOS Gopher Browser (Virtual Box only) - YouTube](https://www.youtube.com/watch?v=eFaMYuggM80) [ZealOS Doc...
## ROSSAU- Tags: crypto- Author: BrokenAppendix- Description: My friend really likes sending me hidden messages, something about a public key with n = 5912718291679762008847883587848216166109 and e = 876603837240112836821145245971528442417. What is the name of player with the user ID of the private key exponent? (Wrap ...
## babypwn- Tags: pwn- Description: Just a little baby pwn. nc babypwn.wolvctf.io 1337 ## Solution- To solve this question you need to download the following files and open the source code. You will see the following: ```#include <stdio.h>#include <string.h>#include <unistd.h> struct __attribute__((__packed__)) data { ...
## WOLPHV I: Reconnaissance- Tags: OSINT- Description: A new ransomware group you may have heard about has emerged: WOLPHV. There's already been reports of their presence in articles and posts. NOTE: Wolphv's twitter/X account and https://wolphv.chal.wolvsec.org/ are out of scope for all these challenges. Any flags fou...
## Made Sense- Tags: Misc, Makekjail, Jail- Description: i couldn't log in to my server so my friend kindly spun up a server to let me test makefiles. at least, they thought i couldn't log in :P ## Solution- When we visit that website, we can see there a link to source code of it. ```import osfrom pathlib import Pathim...
## PQ- Tags: Crypto- Description: Sup! I have a warm-up exercise for you. Test yourself! ## Solution- To solve this question you need to download the two files and open them. One contains a script, another contains an output after encryption process.- This is a RSA encryption. RSA is a type of asymmetric encryption, wh...
1. Use the protocol statistics to determine that the bulk of the traffic is modbus1. There are several devices. Trial and error determines that the device with IP 10.0.2.7 is the one of interest.1. The TCP payload shows the following structure: 000400000006000600[03]00[66]1. We are interested in the thi...
TLDR: We are given a server that communicates over ICMP, like the `ping` command. Use a utility that is capable of crafting custom ICMP packets and interact with a TinyDB on the remote machine to obtain the flag. I Full writeup here: https://meashiri.github.io/ctf-writeups/posts/202403-jerseyctf/#p1ng-p0ng ```$ sudo ...
Help Goku get over 9000 energy to defeat his enemy Vegeta and save the world. 3.23.56.243:9005 --- Visit the site. Head to Chrome Dev Tools --> Sources. Here's the .js file controlling it all: ```js let currentEnergy = 0; function gatheringEnergy(){ currentEnergy++; $("#energycount").html(`${currentEnergy}`...
We are at 3.23.56.243:9003. We are so secure that we only allow requests from our own origin to access secret data. --- Checking out the page request in Burp, we find this line in the response: ```yamlAccess-Control-Allow-Origin: https://texsaw2024.com``` So that's what our origin needs to be. Send the request to /...
The flag is at 3.23.56.243:9008. Unfortunately it seems like the site is down right now :( . Maybe you can ask someone for help? Don't blow up their inbox though :) and make sure you clearly tell them what you want. --- Visiting the [site](http://3.23.56.243:9008/), we are presented the following message, and nothing...
You've been locked in the worst prison imaginable: one without any meatballs! To escape the prison, you must read the flag using Python! `nc 3.23.56.243 9011` --- After playing around with it a bit, and getting various errors, here's what I got: ```blacklist: import, dir, print, open, ', ", os, sys, _, eval, exec...
may your code be under par. execute the getflag binary somewhere in the filesystem to win `nc mc.ax 31774` [jail.zsh](https://gthub.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Dice-CTF-Quals-2024/jail.zshs) --- We're given a "zsh" jail file: ```bash#!/bin/zshprint -n -P "%F{green}Specify your charset: %f...
Follow the leader. [ddg.mc.ax](https://ddg.mc.ax/) --- Visit the site. Seems like some sort of game. Heading to Chrome Dev Tools with Inspect, there is a source file for (index): ```html<script src="/mojojs/mojo_bindings.js"></script><script src="/mojojs/gen/third_party/blink/public/mojom/otter/otter_vm.mojom.js"...
A simple implementation of the Winternitz signature scheme. `nc mc.ax 31001` [server.py](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Dice-CTF-Quals-2024/server.py) --- We're provided a single file, `server.py`: ```py#!/usr/local/bin/python import osfrom hashlib import sha256 class Wots: de...
i couldn't log in to my server so my friend kindly spun up a server to let me test makefiles. at least, they thought i couldn't log in :P [https://madesense-okntin33tq-ul.a.run.app](https://madesense-okntin33tq-ul.a.run.app) --- Visiting the website brings us to a page where we can enter a "Target name" and somethi...
Surely they got it right this time. `nc tagseries3.wolvctf.io 1337` [chal.py](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/crypto/tag-series-3/chal.py) --- We're provided a Python source file: ```pyimport sysimport osfrom hashlib import sha1 MESSAGE = b"GET FILE: "SECRET = os.u...
Don't worry, the interns wrote this one. `nc tagseries1.wolvctf.io 1337` [chal.py](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/crypto/tag-series-1/chal.py) --- We're provided a Python source: ```pyimport sysimport osfrom Crypto.Cipher import AES MESSAGE = b"GET FILE: flag.txt"...
I was AFK when the flag was being encrypted, can you help me get it back? [NY_chal_time.py](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/crypto/limited-2/NY_chal_time.py) --- We're provided a Python source: ```pyimport timeimport randomimport sys if __name__ == '__main__': fla...
It's pretty easy to find random integers if you know the seed, but what if every second has a different seed? [chal_time.py](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/crypto/limited-1/chal_time.py) --- We're provided a Python source: ```pyimport timeimport randomimport sys if ...
We managed to log into doubledelete's email server. Hopefully this should give us some leads... `nc blocked2.wolvctf.io 1337` [server.py](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/crypto/blocked-2/server.py) --- We're given a Python source: ```py import randomimport secretsi...
The WOLPHV group (yes, this is an actual article) group encrypted our files, but then blocked us for some reason. I think they might have lost the key. Let's log into their accounts and find it... `nc blocked1.wolvctf.io 1337` [server.py](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-20...
Can you survive the gauntlet? 10 mini web challenges are all that stand between you and the flag. Note: Automated tools like sqlmap and dirbuster are not allowed (and will not be helpful anyway). [https://gauntlet-okntin33tq-ul.a.run.app](https://gauntlet-okntin33tq-ul.a.run.app) --- Challenge 1: ```Welcome to the ...
A harder babypwn. `nc babypwn2.wolvctf.io 1337 ` [babypwn2](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/beginner/babypwn2) [babypwn2.c](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/beginner/babypwn2.c) --- We're provided a binary ELF and a C ...
Just a little baby pwn.`nc babypwn.wolvctf.io 1337 ` [babypwn](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/beginner/babypwn) [babypwn.c](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/beginner/babypwn.c) --- We're provided a binary ELF and a C sour...
I have encrypted some text but it seems I have lost the key! Can you find it? [yors-truly.py](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/beginner/yors-truly.py) --- <script src="https://cdn.mathjax.org/mathjax/latest/MathJax.js?config=TeX-AMS-MML_HTMLorMML" type="text/javascri...
One-time pads are perfectly information-theoretically secure, so I should be safe, right? [chall.py](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/beginner/chall.py) [eFlag.bmp](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/beginner/eFlag.bmp) [eWo...
I think i might leaked something but i dont know what Author : Bebo07 [chall2.txt](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/0xL4ugh-CTF-2024/chall2.txt) [chall2.py](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/0xL4ugh-CTF-2024/chall2.py) --- We're given a Python sour...
<script src="https://cdn.mathjax.org/mathjax/latest/MathJax.js?config=TeX-AMS-MML_HTMLorMML" type="text/javascript"></script> Author : mindFlayer02 [source.sage](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/0xL4ugh-CTF-2024/source.sage) [out.txt](https://github.com/Nightxade/ctf-writeups/blob/...
To prevent the RB from impersonating any communications coming from you to our team, we need to employ an extremely secure digital signature algorithm. One of the most secure signature algorithms out there is the one used for bitcoin and ehtereum. Using the same Elliptic Curve used for those cryptocurrency calculations...
- The attached files were recovered from an attack committed by the malicious AI named RB. - The first file contains fragments of code to implement an encryption scheme, this program is not complete. - The second file contains the ciphertext generated through the use of the encryption schemes' code. There is also ano...
*For the full experience with images see the original blog post! (It contains all stages.)* Now, funny enough I already built a write gadget for the second challenge.For this one, I simply cleaned up the code a lot and fixed a few bugs where I accidentally overwrote stuff (because I didn't send null bytes in plaintext ...
*For the full experience with images see the original blog post! (It contains all stages.)* For the second challenge, I worked together with Ordoviz.Together, we started to look at the fake flag mentioned in the description and tried to find a way to leak that on the remote.This flag is used in `func_15d7` below that w...
*For the full experience with images see the original blog post! (It contains all stages.)* For the first stage of the series, we get the challenge binary and text file, `data.txt`.The text file contains the parameters that were passed to the binary and the encrypted output, likely of the first flag, in python-like for...
*For the full experience with images see the original blog post!* This challenge was released with the final batch of challenges of the qualifiers, 6 hours before end.Some of our team (including, but not limited to, me) had already worked pretty much through the night, but we anticipated the challenges eagerly.Thankful...
*For the full experience with images see the original blog post!* The heavily Doctor Who-themed challenge Exterminate provides us with an apk file for some Android reversing.Looking at the decompilation (most online tools or IDEs should suffice) result I found a few simple classes including two activities.The main acti...
*For the full experience with images see the original blog post!* **TL;DR:** the challenge is a UBF parser with an out of bounds write vulnerability in boolean arrays because of missing header checks.This vulnerability allows us to overwrite string data and get the uncensored flag. The provided binary is an unpacking u...
For the full experience with images see the original blog post! **TL;DR:** oldschool is a classic crackme binary with an interesting password check method we have to reverse.It uses ncurses terminal UI and anti-debugging measures as a small twist though. The challenge provides us with a 32-bit crackme binary and a pyth...
After reading the description of the challenge, the conversation of the message, and seeing the hint, it was more than evident that the solution to the problem would be to perform a dictionary attack, but a dictionary attack profiled towards the target. There are several tools to do this but none that I know of is as e...
**First thing i did was opening the binary in GhidraAnd there was only these two useful functions :** **Vuln :**``` undefined vuln() undefined AL:1 <RETURN> undefined1[32] Stack[-0x28] Buffer XREF[1]: 0040119...
# netrunner-detected > The netrunners were detected in our network. They used LOTL tactics and utilized `nmap` but we don't know what the traffic means or what their ultimate goal was. Can you replicate the `nmap` scan based off the captured traffic?>> Flag Format: order the arguments in alphabetical order, left to rig...
Upon reverse engineering the 32-bit binary `runme`, you will notice that all of the assembly instructions are `mov` instructions, which makes the machine incredibly difficult to decipher with decompilers or debuggers. In other words, this binary was obfuscated using the [movfuscator](https://github.com/xoreaxeaxeax/mov...
### The Thought ProcessWe are given a segment of an MFT (Master File Table). We probably know that the MFT is part of a filesystem (most likely, Windows NTFS) but not much more. A quick Google search for MFT reveals that it is a structure that stores the metadata for files in the filesystem, as well as data or pointers...
## **The Thought Process** The target program is simple: First, you are prompted for your order. Your order is then repeated back to you (exactly, character-for-character) and you are prompted to enter your payment information. The binary is available for us to download and run tests on our local machine. Our input fo...
Since the flag starts with `texsaw`, we can deduce that the first 6 numbers correspond with [116, 101, 120, 115, 97, 119]. With 6 data points we can set up a polynomial of degree 5 to fit the first 6 numbers. `ax^5 + bx^4 + cx^3 + dx^2 + ex + f = res`. 116^5a + 116^4b + 116^3c + 116^2d + 116e + f = 101419379536555341...
When we open the fake xkcd website, we see an image. Downloading this image, it's named secrets.png. The image has a pixelated portion of text, when we run it through a tool called Unredacter https://github.com/BishopFox/unredacter, we get the first part of the flag `pix314te_` But that's not all. If we examine secrets...
##### Solution: You are given a zip file with 5 images. Because the desciption says find a location and you are given images the best place to start is the exif data because it can contain location information. If you look at the exif data of the images using exiftool you will notice that there is GPS Positions in ever...
## Lucky Faucet [easy] ### Description `The Fray announced the placement of a faucet along the path for adventurers who can overcome the initial challenges. It's designed to provide enough resources for all players, with the hope that someone won't monopolize it, leaving none for others.` ### Initial AnalysisLike the `...
## Recovery [easy] ### Description `We are The Profits. During a hacking battle our infrastructure was compromised as were the private keys to our Bitcoin wallet that we kept.We managed to track the hacker and were able to get some SSH credentials into one of his personal cloud instances, can you try to recover my Bitc...
## Russian Roulette [very easy] ### Description `Welcome to The Fray. This is a warm-up to test if you have what it takes to tackle the challenges of the realm. Are you brave enough?` ### Initial Analysis HTB spawned two Docker containers and provided a `.zip` file containing smart contracts, `Setup.sol` and `RussianRo...
# NETWROKING: dread pirate Original writeup (go check it out!): https://github.com/Om3rR3ich/CTF-Writeups/blob/main/Cyber%20Cooperative%202023/dread_pirate.md solver: [Om3rR3ich](https://github.com/Om3rR3ich) writeup-writer: [Om3rR3ich](https://github.com/Om3rR3ich) **Description**:> We've got an agent on the insid...
# CRYPTO: Eve and The Thousand Keyssolvers: [N04M1st3r](https://github.com/N04M1st3r), [L3d](https://github.com/imL3d) writeup-writer: [L3d](https://github.com/imL3d) **Description:**> We've found an exposed SSH service on the target company network. We scraped the SSH public keys from all the developers from their ...
# Web: valid yamlsolvers: [L3d](https://github.com/imL3d), [Pr0f3550rZak](https://github.com//Pr0f3550rZak) writeup-writer: [L3d](https://github.com/imL3d) **Description:**> Yet Another Markup Language, YAML, YAML Ain't Markup Language, Yamale **files (copy):** [src.zip](https://github.com/C0d3-Bre4k3rs/CyberCoopera...
# PWN: Stumpedsolver: [N04M1st3r](https://github.com/N04M1st3r) writeup-writer: [L3d](https://github.com/imL3d) **Description:**> Michael's computer science project shows the structure of tar files. It is using the tree command on the backend, and something just doesn't seem right... **files (copy):** [app.py](https...
# WolvCTF 2024 Writeup (Team: L3ak, 4th Place)Competition URL: https://wolvctf.io/ ## Game, CET, Matchin this challenge we are giving the following binary [chal](https://raw.githubusercontent.com/S4muii/ctf_writeups/main/wolvctf24/game_cet/chal) . No Dockerfile , no libc, no nothing. so first of all let's try checksec ...