text_chunk
stringlengths
151
703k
# DEFCON CTF 2015 Quals shitcpu Writeup Author: libmaru @ Blue-Lotus ## Instruction Set opcode[5] rd[3] imm[8] 00001: mem[GPR[rd]] = imm8 00011: GPR[rd] |= imm8 << 8 00101: GPR[rd] = (BYTE) mem[PC+imm8+2] 00111: (BYTE) mem[PC+imm8+2] = GPR[rd] 01001: GPR[rd] = (WORD) mem[PC+imm8+2] 01011: (WORD) mem[PC+imm8+2] = GPR[r...
# PoliCTF 2015: reversemeplz ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| PoliCTF 2015 | reversemeplz | Reversing | 200 | **Description:**>*Last month I was trying to simplify an algorithm.. and I found how to mess up a ...
# PoliCTF 2015 3DOGES2 400 Unfortunately I wasn't able to solve this problem during the competition... First glance through the code it's using TripleDES to encrypt data Digging around the code a bit, I found this part of the code particularly interesting, especially with the comment... ```gofunc muchSecurity(key []byt...
# polictf: John the Packer ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| polictf | John the Packer | Reversing | 350 | >*John's greatest skill is to pack everything and everywhere with everyone. He doesn't want that someo...
# DEF CON CTF Quals 2015: r0pbaby ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| DEF CON CTF Quals 2015 | r0pbaby | Baby's first | 1 | **Description:**>*[r0pbaby_542ee6516410709a1421141501f03760.quals.shallweplayaga.me:104...
# PoliCTF 2015: johnthepacker ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| PoliCTF 2015 | johnthepacker | Reversing | 350 | **Description:**>*John's greatest skill is to [pack everything and everywhere](challenge/topack)...
# polictf: reversemeplz ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| polictf | Reversemeplz | Reversing | 200 | **Description:**>*Last month I was trying to simplify an algorithm.. and I found how to mess up a source rea...
Once you have the pcap file: john-in-the-middle.pcap.We can use different tools.We used foremost <pcap_file>.It extracts the five png pictures in output folder.There are five images in png directory. Once we open the directory there is image which contains image with flag.We used imagemagic tool to get the flag.$ conve...
# ASIS Quals CTF 2015: Strange Authen **Category:** Web**Points:** 225**Solves:** 12**Description:** > Go [there](http://strangeauthen.asis-ctf.ir/) and find the flag. ## Write-up by [Ghaaf](https://github.com/Ghaaf) After spend sometimes to find some vulnerabilities with no luck I check robots.txt, there was an import...
### JOHN IN THE MIDDLE##### 100 pointsQuestion--Can John hijack your surfin'? :) `GPG key: GhairfAvvewvukDetolicDer-OcNayd#` File: [john-in-the-middle_153a4fa94b9c23459897157df4ed4105.tar.gz.gpg](john-in-the-middle_153a4fa94b9c23459897157df4ed4105.tar.gz.gpg)Readings--* [Thresholding](https://goo.gl/0kCOVL) Answer--F...
#Hard Interview **Category:** Grab Bag**Points:** 50**Description:** > interview.polictf.it:80 ##Write-up >The first thing we did was netcat to the above address:port and got the following screen:>![Image of Hard Interview hint](./hint.tiff) >The description for the challenge is basically a quote from the movie Swordfi...
### HANOI AS A SERVICE ##### 50 pointsQuestion--Check out our shiny new HaaS platform! `nc haas.polictf.it 80` Readings--* https://en.wikipedia.org/wiki/Tower_of_Hanoi* https://en.wikipedia.org/wiki/Prolog Answer--Lets see what the service does: ```$ nc haas.polictf.it 80Welcome to the Hanoi-as-a-Service cloud platf...
Unhackable : “Not hackable; that cannotbe hacked or broken into.” We manageupdates and thus have fixes, this is not aPS3 as it is unhackable … or is it? Score200 Link http://updator.challs.nuitduhack.com/
<html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system"> <head> <meta charset="utf-8"> <link rel="dns-prefetch" href="https://github.githubassets.com"> <link rel="dns-prefetch" href="https://avatars.githubusercontent.com"> <link rel="dns-prefetch...
<html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system"> <head> <meta charset="utf-8"> <link rel="dns-prefetch" href="https://github.githubassets.com"> <link rel="dns-prefetch" href="https://avatars.githubusercontent.com"> <link rel="dns-prefetch...
<html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system"> <head> <meta charset="utf-8"> <link rel="dns-prefetch" href="https://github.githubassets.com"> <link rel="dns-prefetch" href="https://avatars.githubusercontent.com"> <link rel="dns-prefetch...
##DEF CON 23 OpenCTF###ffbank I recently played in the [OpenCTF](http://www.openctf.com) at DEF CON 23 alongside team_reddit, which formed on [/r/defcon](https://reddit.com/r/defcon) just a few days before the competition. For many of us (myself included) it was one of our first CTFs, and we managed to come in 12th pla...
#John the Referee **Category:** Web**Points:** 150**Description:** > John is one of the most famous referee and security experts in the world. He loves encryption and his referee uniforms. You can find them on his online store. Unfortuneately his best uniform is not on sale for anyone. I know that it is available o...
<html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system"> <head> <meta charset="utf-8"> <link rel="dns-prefetch" href="https://github.githubassets.com"> <link rel="dns-prefetch" href="https://avatars.githubusercontent.com"> <link rel="dns-prefetch...
#!/usr/bin/env expectset stty_init rawspawn nc mathwhiz_c951d46fed68687ad93a84e702800b7a.quals.shallweplayaga.me 21249 while true { expect -re "(.*)=" { set expression "$expect_out(1,string)" set expression [string map {[ ( ] ) \{ ( \} )} $expression] set expression [string map {ONE 1 TWO 2 THREE 3} $expressi...
## Orient Heights - Crypto 250 Problem - Writeup by Robert Xiao (@nneonneo) In this problem, we are given an implementation of the ElGamal signature scheme along with 357 putative signed messages. The hint for the problem says > Obviously, don't use one of the signatures I gave you---that still won't work. So let's loo...
# Plaid CTF 2014: Sanity check **Category:** Misc**Points:** 1**Description:** > The key is poop ## Write-up They aren’t kidding. The flag is literally `poop`. ## Other write-ups and resources * <https://github.com/hackerclub/writeups/tree/master/plaidctf-2014/Sanity-check>* <http://csrc.tamuc.edu/css/?p=152>
<html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system"> <head> <meta charset="utf-8"> <link rel="dns-prefetch" href="https://github.githubassets.com"> <link rel="dns-prefetch" href="https://avatars.githubusercontent.com"> <link rel="dns-prefetch...
<html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system"> <head> <meta charset="utf-8"> <link rel="dns-prefetch" href="https://github.githubassets.com"> <link rel="dns-prefetch" href="https://avatars.githubusercontent.com"> <link rel="dns-prefetch...
# Uploader (Web, 100pts) --- ## Problem This uploader deletes all /<\?|php/. So you cannot run php. http://recocta.chal.mmactf.link:9080/http://recocta.chal.mmactf.link:9081/ (Mirror 1)http://recocta.chal.mmactf.link:9082/ (Mirror 2)http://recocta.chal.mmactf.link:9083/ (Mirror 3) You can only upload files whose name i...
# MMACTF 2015: Signer and Verifier ## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| MMACTF 2015 | Signer and Verifier | Crypto | 100 | **Description:**>*Signer: nc cry1.chal.mmactf.link 44815*>>*Verifier: nc cry1.chal.mmactf.link 4481...
# ASIS CTF Quals 2015: simple algorithm ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| ASIS CTF Quals 2015 | simple algorithm | Crypto | 100 | **Description:**>*The flag is encrypted by this code, can you decrypt it after ...
#John the Traveller **Category:** Web**Points:** 100**Description:** > Holidays are here! But John still hasn't decided where to spend them and time is running out: flights are overbooked and prices are rising every second. Fortunately, John just discovered a website where he can book last second flight to all the Eur...
# ASIS Cyber Security Contest Finals 2014: CapLow **Category:** Crypto**Points:** 75**Description:** > Find the flag> Our new agent encrypt a message like this, let us know what he wanted to say!> `qvnju181mjziote0zge4mdk0odi4odfmnmnmnmi5zjm2yzy3mq==` ## Write-up The `==` at the end of the provided ciphertext hints at ...
Decrypt 4 flags.36 36 2a 64 4b 4b 4a 21 1e 4b 1f 20 1f 21 4d 4b 1b 1d 19 4f 21 4c 1d 4a 4e 1c 4c 1b 22 4f 22 22 1b 21 4c 20 1d 4f 1f 4c 4a 19 22 1a 66http://bow.chal.mmactf.link/~scs/crypt2.cgie3 e3 83 21 33 96 23 43 ef 9a 9a 05 18 c7 23 07 07 07 c7 9a 04 33 23 07 23 ef 12 c7 04 96 43 23 23 18 04 04 05 c7 fb 18 96 43 e...
## Alicegame - Crypto 250 Problem - Writeup by Robert Xiao (@nneonneo) In this challenge, you connect to a server which generates a random set of parameters forElGamal encryption, then lets you encrypt up to 10 messages with chosen `r`. It then encryptsthe flag with a random `r` and asks you to decrypt it. In brief, th...
# Login As Admin!(2) | http://login2.chal.mmactf.link/ | Web | 200 points ||---------------------------------|-----|------------| This challenge, at first, didn't seem vulnerable. Using the test credentials that were provided, we see that a random token is assigned to the user in a cookie named `ss`. I finally stumbled...
## QR code recovery challenge - Misc 400 Problem - Writeup by Robert Xiao (@nneonneo) We're given a QR code which is missing a ton of pixels: >![original QR code](00-original.png) Obviously, if you try to scan the QR code with a normal reader, nothing will happen.I chose to solve this challenge by reconstructing and de...
## i - Programming 150 Problem - Writeup by Robert Xiao (@nneonneo) For this challenge, you are given the implementation of a simple stack-based language called "i"(itself written in a slightly obscure language called Icon), and asked to write a *quine*: a programwhich, when run, perfectly reproduces its own source cod...
## LCGSign - Crypto 400 Problem - Writeup by Robert Xiao (@nneonneo) In this challenge, two messages have been signed using DSA (Digital Signature Algorithm).Crucially, the two messages are related through the secret "random", which has beengenerated by a linear-congruential random number generator (an LCG). LCGs are n...
# MMA 2015## regrettable ecc #### 암호화```pythondef encrypt(H, m): r = getRandomRange(1, p) M = r * G S = e * M T = e * r * H - M #print "encrypt: M = %s" % M cipher = AES.new(long_to_bytes(M.x, 32), mode = AES.MODE_CBC, IV = DEM_IV) dem_c = bytes_to_long(cipher.encrypt(pad(m))) return (S, T, dem_...
#Crack Me If You Can **Category:** Reversing**Points:** 100**Description:** > John bets nobody can find the passphrase to login! > GPG key: viphHowrirOmbugTudIbavMeuhacyet > [Crack Me If You Can](crack-me-if-you-can_d4e396383e3f64ec7698efaf42f7f32b.tar.gz.gpg) ##Write-up> To start, we are given an apk to reverse. The ...
# CSAW CTF 2015: Throwback ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| CSAW CTF 2015 | Throwback | Web | 600 | **Description:**>*Programming is hard. CTF software is hard too. We broke our CTF software a few years ago a...
# CSAWCTF 2015: FTP ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| CSAWCTF 2015 | FTP | Reversing | 300 | **Description:**>*We found an ftp service, I'm sure there's some way to log on to it.*>>*nc 54.175.183.202 12012*>>*...
# CSAW CTF 2015: Weebdate ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| CSAW CTF 2015 | Weebdate | Web | 500 | **Description:**>*Since the Ashley Madison hack, a lot of high profile socialites have scrambled to find the h...
A PCAP file was provided for analysis named net_756d631588cb0a400cc16d1848a5f0fb.pcap.  Opening the file in Wireshark and performing a string search for "flag{" (Filter Flag of Edit --> Find Packet with String/Packet bytes selected) yields some code and text in packet 60.  Following the TCP stream (right click --> Foll...
# CSAWCTF 2015: contacts ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| CSAWCTF 2015 | contacts | Pwn | 250 | **Description:**>*nc 54.165.223.128 2555*>>*[contacts_54f3188f64e548565bc1b87d7aa07427](challenge/contacts)* ---...
## TransferWriteup by @auscompgeek. > I was sniffing some web traffic for a while, I think i finally got something interesting. Help me find flag through all these packets.>> net_756d631588cb0a400cc16d1848a5f0fb.pcap Let's cut to the chase. The provided pcap contains a TCP connection from 192.168.15.133 to 192.168.15.1...
## sharpturnWriteup by @auscompgeek. ### Introduction> I think my SATA controller is dying.>> HINT: `git fsck -v` The given hint was added later during the CTF. First, we realise that the given tarball is a bare Git repo. This happens to beextremely easy if your shell prompt displays Git repo information. Otherwise,o...
The html page you create will be visited bythe backdoor admin with the flag. You canenter a fake flag to simulate the challenge.Get the flag at http://hack.bckdr.in/MEDUSA/
# memeshop: Exploitation 400 Walkthrough This challenge was a lot of fun. ## Introduction Telnet in, and you're greeted with the following: ```hi fellow memerswelcome to the meme shopu ready 2 buy some dank meme? ---------------------------I HAVE A DEGREE IN MEMETICS AND BEING USELESS ---------------------------so... l...
# Lawn Care Simulator (Web, 200pts) ## Problem Lawn Care Simulator is a simple web application to show how the grass is growing. Yeah, ok. It has premium content, but it requires registration. Registration not working and there's no way to log in as we can't register any account. ![Lawn Care Simulator](https://github.c...
1. register account 2. login on site3. next create new team4. post team name like this: https://twitter.com/d90andrew/status/516501572852142081 5. wait Connection from [213.233.181.233] port  XXXX [tcp/*] accepted GET /asdsdf?ddd=PHPSESSID=idhn48c8on07q415h4tip01ng5 HTTP/1.16. use session and get flag.
#Alexander Taylor **Category:** Recon**Points:** 100**Description:** http://fuzyll.com/csaw2015/start ##Write-upWe get our first clue from hitting the link in the description. ![Image of 1](./Images/1.png) We are left with an unkown numbers of steps, but at least we have somewhere to start. Off to google. Using both ...
from z3 import * table1 = [0x70, 0x30, 0x53, 0xA1, 0xD3, 0x70, 0x3F, 0x64, 0xB3, 0x16, 0xE4, 0x04, 0x5F, 0x3A, 0xEE, 0x42, 0xB1, 0xA1, 0x37, 0x15, 0x6E, 0x88, 0x2A, 0xAB]table2 = [0x20, 0xAC, 0x7A, 0x25, 0xD7, 0x9C, 0xC2, 0x1D, 0x58, 0xD0, 0x13, 0x25, 0x96, 0x6A, 0xDC, 0x7E, 0x2E, 0xB4, 0xB4,...
#Airport **Category:** Forensics**Points:** 200**Description:** NA [airport_26321e6eac7a7490e527cbe27ceb68c1.zip](airport_26321e6eac7a7490e527cbe27ceb68c1.zip) ##Write-up We get our first clue from hitting the link in the description and retrieving the zip file. This file contains four .png and one .jpg file. The fou...
This is a completely static analysis solution, and how we did it during the competition:http://ohaithe-re.tumblr.com/post/129657401392/csaw-quals-2015-reversing-500-wyvernIf you want a really silly script that can solve it with angr, a binary analysis framework, though, here's a way to do that. We didn't actually do it...
# Plaid CTF 2015: Curious **Category:** Crypto**Points:** 70**Description:** >The curious case of the random e.>>We've [captured](challenge/captured) the flag encrypted several times... do you think you can recover it? ## Write-up The challenge consists of a file containing a collection of tuples: >{N : e : c}>{0xfd20...
# ASIS Quals CTF 2015: Simple Algorithm **Category:** Crypto**Points:** 100**Solves:** 102**Description:** > The flag is encrypted by this [code](http://tasks.asis-ctf.ir/simple_algorithm_5a0058082857cf27d6e51c095ac59bd5), can you decrypt it after finding the system? ## Write-up by [DerBaer0](https://github.com/DerBaer...
Hello there,We are looking for a developer or securityconsultant to secure our filebox system. Westumbled upon your LinkedIn profile and itseems like you would be a perfectcandidate for this job. Could you pleasesend us your CV and Motivation letter?Thanks,
#ones_and_zer0es **Category:** Crypto**Points:** 50**Description:** NA [eps1.1_ones-and-zer0es_c4368e65e1883044f3917485ec928173.mpeg](eps1.1_ones-and-zer0es_c4368e65e1883044f3917485ec928173.mpeg) ##Write-up## This file is ascii text: >```root@ctf:~/Downloads/CTF# file eps1.1_ones-and-zer0es_c4368e65e1883044f3917485ec92...
#notesy **Category:** Crypto**Points:** 100**Description:** http://54.152.6.70/ The flag is not in the flag{} format. HINT: If you have the ability to encrypt and decrypt, what do you think the flag is? HINT: https://www.youtube.com/watch?v=68BjP5f0ccE ##Write-up## The link is for a website that has a single text box ...
#zer0-day **Category:** Crypto**Points:** 50**Description:** NA [eps1.9_zer0-day_b7604a922c8feef666a957933751a074.avi](eps1.9_zer0-day_b7604a922c8feef666a957933751a074.avi) ##Write-up## The eps1.9_zer0-day_b7604a922c8feef666a957933751a074.avi file is actually ascii text >```root@ctf:~/Downloads/CTF# file eps1.9_zer0-da...
#Eric Liang **Category:** Recon**Points:** 100**Description:** Eric played ctfs with some friends a while ago ##Write-upThis 100 point challenge was to find a flag related to Eric Liang and CTFs in which he participated in the past with some friends. The first thing we set out to do was find out more information on Er...
## RSA (crypto, 100p) ### PL Version`for ENG version scroll down` Zadanie polegało na odszyfrowaniu wiadomości szyfrowanej za pomocą RSA mając dostęp do klucza publicznego. Wiadomość to: `kPmDFLk5b/torG53sThWwEeNm0AIpEQek0rVG3vCttc=` A klucz: -----BEGIN PUBLIC KEY----- MDwwDQYJKoZIhvcNAQEBBQADKwAwKAIhALYtzp8lgWNXI9trG...
## Captcha (ppc/Misc, 300p) ### PL Version`for ENG version scroll down` Zadanie polegało na rozwiązaniu 500 kodów captcha poprawnie pod rząd, przy czym można było pomijać których nie chcieliśmy rozwiązywać captche. Serwowane kody miały postać: ![](./captcha.png) W celu rozwiązania zadania napisaliśmy skrypt w pythonie ...
## Calculator (ppc/Programming, 200p) ### PL Version[click for ENG](#eng-version) Zadanie polegało na połączeniu się za pomocą NC z podanym serwerem. Serwer podawał na wejściu działania i oczekiwał na ich rozwiązania. Należało rozwiązać kilkadziesiąt przykładów pod rząd aby uzyskać flagę. Działania przychodzące z serwe...
# Teaser CONFidence CTF 2015: Mac Hacking ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| Teaser CONFidence CTF 2015 | Mac Hacking | Crypto | 150 | **Description:**>*They laughed at my XOR encryption. Then, they mocked me f...
# CodeGate General CTF 2015: Owlur **Category:** Web**Points:** 400**Description:** >http://54.65.205.135/owlur/>>if you use a web scanner, your IP will get banned no bruteforce required, take it easy ## Write-up The challenge was a basic PHP web application, the index.php tells us that this is an image sharing site f...
## Julian Cohen (recon, 100p, 883 solves) ### PL Version`for ENG version scroll down` Bardzo krótkie zadanie. Wyszukiwanie Juliana Cohena, zawężone do tematyki CTFów pozwala bardzo szybo trafić na jego twittera (@HockeyInJune) gdzie wprost umieścił flagę w jednym z wpisów `https://twitter.com/HockeyInJune/status/641716...
# Trend Micro CTF 2015: crypto200 ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| Trend Micro CTF 2015 | crypto200 | Crypto | 200 | **Description:**>*Category: Cryptography*>>*Points: 200*>>*Zip Password: image_q*>>*[Your s...
## Alexander Taylor (recon, 100p, 424 solves) ### PL Version`for ENG version scroll down` Dostajemy link od którego możemy wystartować `http://fuzyll.com/csaw2015/start`Pod linkiem jest pierwsza zagadka: `CSAW 2015 FUZYLL RECON PART 1 OF ?: Oh, good, you can use HTTP! The next part is at /csaw2015/<the acronym for my u...
## Weebdate (web, 500p, 69 solves) ### PL Version`for ENG version scroll down` Zadanie polegało na zdobyciu hasła oraz sekretnego kodu `TOTP` wykorzystywanego do podwójnej autentykacji dla użytkownika pewnego serwisu internetowego. Zadania nie udało nam sie finalnie rozwiązać, ale jedynie z braku czasu (znaleźliśmy klu...
## AES (crypto, 200p) ### PL Version`for ENG version scroll down` Zadanie polegało na odzyskaniu wektora inicjalizacyjnego IV dla szyfru AES na podstawie znajomości wiadomości, części klucza oraz części zaszyfrowanego tekstu. Dane były przekazane za pomocą pomazanego zdjęcia kodu: ![](./q.png) Wynika z nich że dysponuj...
## pcapin (forensics, 150p, 41 solves) > We have extracted a pcap file from a network where attackers were present. We know they were using some kind of file transfer protocol on TCP port 7179. We're not sure what file or files were transferred and we need you to investigate. We do not believe any strong cryptography w...
## Keep Calm and CTF (forensics, 100p, 1064 solves)`My friend sends me pictures before every ctf. He told me this one was special.Note: this flag doesn't follow the "flag{}" format` ![](./kc&ctf.jpg) ### PL Version`for ENG version scroll down` Pierwszą rzeczą jaką robimy w takich sytuacjach jest przejrzenie hexdumpu, t...
#Offensive 100 (web, 100p) ## PL`For eng scroll down` W tym zadaniu dostajemy stronę z 3 sekcjami: * Przycisk Sign up * Przycisk Sign in * Tabela z logiem logowań W tym zadaniu trzeba było zauważyć 2 rzeczy: * Czasami, logując się, zamiast zalogować się na swoje konto zostajemy zalogowani na konto osoby która zalo...
## Lawn Care Simulator (web, 200p, 450 solves)`http://54.165.252.74:8089/` ### PL Version`for ENG version scroll down` Zadanie polegało na zalogowaniu się do konta premium w internetowym symulatorze hodowania trawy.Standardowe próby wykonania SQL Injection na polach formularza nie przyniosły efektów, ale pozwoliły zaob...
## wh1ter0se (crypto, 50p, 753 solves) > Note: The flag is the entire thing decrypted> [eps1.7_wh1ter0se_2b007cf0ba9881d954e85eb475d0d5e4.m4v](wh1ter0se.bin) ### PL Version`for ENG version scroll down` Pobieramy wskazany plik. Jego zawartość to: EOY XF, AY VMU M UKFNY TOY YF UFWHYKAXZ EAZZHN. UFWHYKAXZ ZNMXPHN. UFW...
# Crypto 100 ## Problem You're given an RSA public key and an encrypted message which contains a flag. Get the flag. There's also a hint about "1bit" being wrong in the public key. ## Solution Credit: [@emedvedev](https://github.com/emedvedev) First of all, let's get the information about the public key: ```$ openssl r...
## FTP (re, 300p, 214 solves) > We found an ftp service, I'm sure there's some way to log on to it.> > nc 54.172.10.117 12012> [ftp_0319deb1c1c033af28613c57da686aa7](ftp) ### PL Version`for ENG version scroll down` Pobieramy zalinkowany plik i ładujemy do IDY. Jest to faktycznie, zgodnie z opisem, serwer FTP. W stringa...
# Analysis - Offensive 100 ## Problem You're given a link to the website, "Strange Auth System". It has register and login forms, and a list recent of logins with timestamps and UIDs. ## Solution Credit: [@emedvedev](https://github.com/emedvedev) You're not given a hint or any indication about what to do, but usually l...
# Programming 100 ## Problem You have to play a game of "choose a square with a different color". The problem is inspired by color vision test games such as this one: http://106.186.25.143/kuku-kube/en-3/ ## Solution Credit: [@emedvedev](https://github.com/emedvedev) After you try to play by hand a little bit, you see ...
# ASIS Cyber Security Contest Finals 2014: How much exactly? **Category:** Trivia**Points:** 25**Description:** > 4046925: How much the exact IM per year?>> `flag=ASIS_md5(size)` ## Write-up Googling for ‘4046925’ leads to [NSA DOCID: 4046925 Untangling the Web: A Guide to Internet Research](https://www.nsa.gov/public_...
<html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system"> <head> <meta charset="utf-8"> <link rel="dns-prefetch" href="https://github.githubassets.com"> <link rel="dns-prefetch" href="https://avatars.githubusercontent.com"> <link rel="dns-prefetch...
# Miscellaneous 100 ## Problem [crossword.xslx](crossword.xslx) ## Solution Credit: [@emedvedev](https://github.com/emedvedev) As it is the case with many Trend Micro challenges, this one involves a lot of guesswork, buzzword-bingo and learning about the way Trend Micro works. Solving it basically involves going throug...
# Crypto 500 ## Problem Think about two different alphabetical strings with the same lengths.After you encode the strings with Base64 respectively, if you find characters located in the same position between the two strings, then you may want to extract them.You may find examples where the final strings are ‘2015’ and ...
# Password encrypting tool (Exploit 100) ## Problem Our second newest programmer created a tool so that we can encrypt our usual passwords and use more secure ones wherever we register new accounts. He said that he left some sort of an easter egg that could leverage you, but he doesn't really expect anyone to get it. Y...
## Notesy (crypto, 100p, 1064 solves)`http://54.152.6.70/The flag is not in the flag{} format.HINT: If you have the ability to encrypt and decrypt, what do you think the flag is?HINT: https://www.youtube.com/watch?v=68BjP5f0ccE` ### PL Version`for ENG version scroll down` Pod wskazanym adresem znajduje się strona z tex...
I hope you like Java.Have array "Base64SET" containing Base64 character set (a-z, A-Z, 0-9, +, /)Have array "Allowed" containing the allowed character set (a-z, A-Z)Loop 9999 times:    - Generate two random strings with length {1, 2, 3, 4, 5, ..., 9999} from the "Allowed" array. (See below, I don't generate all 9999 pa...
# Analysis - Offensive 100 ## Problem [vonn.zip](vonn.zip) Analyze this! (pass: wx5tOCvU3g2FmueLEvj5np9xJX0cND3K) ## Solution Credit: [@gellin](https://github.com/gellin) It doesn't come with any hints or direction, so lets take a stab at it with the `file` command. ```root@kali:/media/sf_vm_share# file vonnvonn: ELF 6...
# Whitehat Contest: Re300 ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| whitehat | Re300 | Reversing | 300 | >*Flag = WhiteHat{SHA1(key)}>>The key is a string that has meaning*---------- ## Write-up### Reversing Open the ...
## Try harder! (misc/stego, 200p) ### PL Version[ENG](#eng-version) W zadaniu dostajemy dwa archiwa:* gzip o nazwie part0* zip o nazwie part3, wymagające hasła do dekodowania Rozpoczęliśmy od analizy archiwum part0 i pierwsze co rzuciło sie w oczy to fakt, że 4MB archiwum dekompresowało sie do 4GB pliku jpg. Analiza a...
# Entry language - (Reverse 100) ## Problem You might be able to talk like them once you find who they are. ## Analysis & SolutionCredit: [@gellin](https://github.com/gellin) ```xpl0@kali:~/Desktop# file r100r100: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-6...
<h1>D-CTF</h1><h2>crypto 300 - Custom function engineering</h2> Le but de cette épreuve était de faire la cryptanalyse de la fonction suivante : ```php ``` Un message encrypté qu'il fallait décryper était joint au sujet : ```320b1c5900180a034c74441819004557415b0e0d1a316918011845524147384f5700264f48091e4500110e41030d1...
# Defcamp CTF - Web400 The website of the challenge is only displaying user number and their associated picture... Looking at the code we can see - For user 1 the picture src field is : `?id=1&usr=1`- For user 2 the picture src field is : `?id=2&usr=2`- ... Strange... Do not think too fast to a SQLi (because it's not ...
<html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system"> <head> <meta charset="utf-8"> <link rel="dns-prefetch" href="https://github.githubassets.com"> <link rel="dns-prefetch" href="https://avatars.githubusercontent.com"> <link rel="dns-prefetch...
# MMACTF 2015: simple_hash ----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| MMACTF 2015 | simple_hash | Reversing | 200 | **Description:**>*[Get the flag!](challenge/simple_hash)>>nc milkyway.chal.mmactf.link 6669* ---------...
## wyvern (re, 500p, 96 solves) ### PL Version`for ENG version scroll down` To zadanie prawdopodobnie byłoby bardzo trudne do zrobienia "klasycznie" (w końcu 500 punktów), ale nam udało się je zrobić bardzo szybko za pomocą statycznej analizy (i odrobiny intuicji, a.k.a. zgadywania). Otwieramy [binarkę](wyvern), i wita...
## Reverse 100 (re, 100p) ### PL[ENG](#eng-version) Dostajemy [program](./r100) (elf konkretnie), który wykonuje bardzo proste sprawdzenie hasła i odpowiada czy hasło jest poprawne czy nie. Domyślamy się że poprawne hasło jest flagą. Cały program to coś w rodzaju: int main() { printf("Enter the password: ")...
## zer0-day (crypto, 50p, 824 solves) > [eps1.9_zer0-day_b7604a922c8feef666a957933751a074.avi](zer0-day.bin) ### PL Version`for ENG version scroll down` Pobieramy wskazany plik. Jego zawartość to: RXZpbCBDb3JwLCB3ZSBoYXZlIGRlbGl2ZXJlZCBvbiBvdXIgcHJvbWlzZSBhcyBleHBlY3RlZC4g\n VGhlIHBlb3BsZSBvZiB0aGUgd29ybGQgd2hvI...
# Programming 200 ## Problem Solve all tasks nc ctfquest.trendmicro.co.jp 51740 ## Solution Credit: [@emedvedev](https://github.com/emedvedev) When you connect to the server, it gives you a range of arithmetic problems and expects answers. ```3 * 4 =``` Sounds simple, right? We can use Python's `eval` and pray that one...
#Defcamp CTF Qualification 2015##No Crypto (Crypto 200) The folowing plaintext has been encrypted using an unknown key, with AES-128 CBC: - Original: Pass: sup3r31337. Don't loose it! - Encrypted: 4f3a0e1791e8c8e5fefe93f50df4d8061fee884bcc5ea90503b6ac1422bda2b2b7e6a975bfc555f44f7dbcc30aa1fd5e - IV: 19a9d10c3b155b55982...
## Can you read Pacifico? (misc/ppc, 400+1p) ### PL Version[ENG](#eng-version) Zadanie polegało na napisaniu łamacza captchy. Captche miały następujący format: ![](./captcha.png) Należało rozwiązać 1337 kodów pod rząd bezbłędnie w celu uzyskania flagi. Jak nie trudno zauważyć konieczne będzie przetworzenie obrazu do w...
[](ctf=defcamp-quals-2015)[](type=reverse)[](tags=shift-cipher) We are given a [binary](../r100.bin). ```bash$ file r100.bin r100.bin: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.24, BuildID[sha1]=0f464824cc8ee321ef9a80a799c70b1b6ae...