text_chunk stringlengths 151 703k |
|---|
##Web 100 (web, 100p)
###PL[ENG](#eng-version)
W zadaniu dostajemy prostą stronę wyświetlającą ilość pieniędzy na koncie oraz okienko do aktywacji kodów. Zostaje nam udostępniony jednorazowy kod doładowujący 10$.
Po użyciu kodu dostajemy komunikat, że ciągle mamy za mało pieniędzy, zatem musimy znaleźć jakiś sposób na ... |
## Crypto 300 (crypto, 300p)
### PL
[ENG](#eng-version)
Bardzo ciekawe zadanie dla nas, musieliśmy sporo z nim powalczyć, ale w końcu udało się rozwiązać zagadkę szyfru.
Otóż dostajemy taki szyfr:
320b1c5900180a034c74441819004557415b0e0d1a316918011845524147384f5700264f48091e45 00110e41030d1203460b1d075215041154... |
## FTP2 (pwn, 300p, ? solves)
### PL[ENG](#eng-version)
> nc 54.172.10.117 12012> [ftp_0319deb1c1c033af28613c57da686aa7](ftp)
Pobieramy zalinkowany plik i ładujemy do IDY. Jest to faktycznie, zgodnie z opisem, serwer FTP - ten sam co w zadaniu FTP (re 300).
Wiemy że flaga znajduje się gdzieś na serwerze. Mamy też usern... |
# Backdoor CTF 2015: Forgot
**Category:** Pwnable**Points:** 200**Description:**
> Fawkes has been playing around with Finite State Automaton lately. While exploring the concept of implementing regular expressions using FSA he thought of implementing an email-address validator.> > Recently, Lua started to annoy Fawkes... |
##Airport (forensics, 200p)
##PL version`for ENG version scroll down`
Dostajemy folder z czteroma nieoznaczonymi zdjęciami lotnisk i następującym pngem:>Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files.
Próbujemy uruchomić program na jpgu (na pnga... |
[](ctf=trend-micro-ctf-2015)[](type=analysis,reverse)[](tags=payload,drop)[](tools=gdb-peda)[](techniques=breakpoints)
I think this is the unintended solution.
We are given a [zip](../vonn.zip) password:wx5tOCvU3g2FmueLEvj5np9xJX0cND3K.This gives us a binary.
```sh$ file vonn vonn: ELF 64-bit LSB executable, x86-64, ve... |
## Reverse 400 (re, 400p)
### PL[ENG](#eng-version)
Najtrudniejsze zadanie z RE na tym CTFie. Dostajemy [program](./r400) (znowu elf), który pobiera od usera hasło. Domyślamy się że to hasło jest flagą.
Tutaj niespodzianka, bo hasło nie jest sprawdzane nigdzie w programie. Po chwili grzebania/debugowania, okazuje się,... |
## ASIS Finals: license
----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| ASIS Finals | License | Reversing | 125 |
*Description*> Find the flag in this file.
----------## Write-up
### Format of Keyfile
We are given a binary fi... |
# ASISCTF Finals 2015: Bodu
----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| ASISCTF Finals 2015 | Bodu | Crypto | 175 |
**Description:**>*Find the flag in [this](challenge/pub.key) [file](challenge/flag.enc).*
----------## ... |
# ASISCTF Finals 2015: Fake
----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| ASISCTF Finals 2015 | Fake | Reversing | 150 |
**Description:**>*Find the flag in this [file](challenge/fake).*
----------## Write-up
We're dealing... |
# ASISCTF Finals 2015: License
----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| ASISCTF Finals 2015 | License | Reversing | 125 |
**Description:**>*Find the flag in this [file](challenge/license).*
----------## Write-up
The ... |
## She said it doesn't matter (misc/stego, 100p)
### PL Version[ENG](#eng-version)
W zadaniu dostajemy obrazek [png](./m100.png) z zepsutym nagłówkiem. Rozpakowujemy zawartość pliku i za pomocą pozyskanych pikseli tworzymy obrazek, w którym ukryta jest flaga. Musimy ustawić dobre wymiary obrazka, które różnią sie od od... |
## Reverse 300 (re, 300p)
### PL[ENG](#eng-version)
Dostajemy [program](./r300.exe) (tym razem PE windowsowe), który pobiera od usera parę username:hasło. Mamy zdobyć hasło dla użytkownika "Administrator".
Okazuje się dodatkowo że są zabezpieczenia przed bezpośrednim zapytaniem o hasło dla usera "Administrator".
Progr... |
This Challenge gives us an encrypted file (flag.enc) and a PEM file (pub.key) containing the public key. This is clearly a RSA Challenge.
The first step is to extract the public key:
`openssl rsa -in pub.key -pubin -text -noout`
We obtain:
```n = 0x03a6160848fb1734cbd0fa22cef582e849223ac04510d51502556b6476d07397f03df15... |
## License 100 (re, 100p)
### PL[ENG](#eng-version)
Dostajemy [program](./license) (elf), do analizy, i rozpoczynamy czytanie kodu.
Program otwiera plik (domyślamy sie że z tytułową licencją), wykonuje serię operacji/sprawdzeń, i jeśli coś mu się nie podoba na którymś kroku, wypisuje błąd i skończy działanie.
.tex... |
## AsisHash 150 (re, 150p)
### PL[ENG](#eng-version)
Dostajemy [program](./hash.elf) (elf). Analizujemy jego działanie, w dużym uproszczeniu wygląda to tak:
int main() { char password[...]; scanf("%s", password);
char *hash = hash_password(password); if (!strcmp(hash, good_hash)) { ... |
## MeowMeow 75 (misc, 75p)

### PL[ENG](#eng-version)
Dostajemy [dziwny plik tekstowy](meowmeow) z różnymi wyrażeniami typu `((_____ << __) + _)`
Jeśli ktoś robił cokolwiek w C to pewnie rozpozna syntax tego języka.
`A << B` odpowiada przesunięciu `A` o `B` bitów w lewo, a `A + B` i `(...)` c... |
I hope you like Java.Get the image. (Also download the image and the HTML source code)Get max Horizontal and Vertical values.Read pixel 0,0 -> MaxHor,MaxVer - If the pixel is white, ignore it. - If the pixel is the first encountered non-white pixel, record the RGB values as BASEred, BASEgreen, BASEblue. - If p... |
# polictf: reversemeplz
----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| polictf | Reversemeplz | Reversing | 200 |
**Description:**>*Last month I was trying to simplify an algorithm.. and I found how to mess up a source rea... |
## sharpturn (forensics, 400p, 110 solves)
> I think my SATA controller is dying.> > sharpturn.tar.xz-46753a684d909244e7d916cfb5271a95
### PL Version`for ENG version scroll down`
Dostajemy zip z czymś co może być tylko zawartością folderu `.git`. Wypakowywujemy więc sobie z niego dane (zrobiliśmy to za pomocą pythona, ... |
# Emotional Roller Coaster (Misc 350)
## Problem
Are you a good listener? Expect us!
_This time you're the target. :-)_
## Solution
Credit: [@emedvedev](https://github.com/emedvedev)
It's a great forensics challenge and also a lot of fun. Although not particuarly hard, it's very creative and nicely layered. 
> Our marvelous Bragisdumus shop just opened. Come and see [our beautiful Bragisdumus](bragisdumu-shop)! > Login as an admin! get the admin password. > nc 185.106.120.220 1337
### PL[ENG](#eng-version)
Z zadaniem otrzymujemy binarkę serwera usługi typu CRUD z wpisami w pamięci proces... |
[](ctf=defcamp-quals-2015)[](type=reverse)[](tags=hardcoded)
We are given a [binary](../r200.bin).
```bash$ file r200.bin r200.bin: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.24, BuildID[sha1]=22e68980e521b43c90688ed0693df78150b102... |
## Big Lie (forensic, 100p, 101 solves)
> Find the [flag](biglie.pcap).
### PL[ENG](#eng-version)
Otrzymany plik pcap ładujemy do Wiresharka i na podstawie wyeksportowanych obiektach z sesji HTTP dochodzimy do wniosku, że użytkownik skorzystał z usługi pastebin, która przed wysłaniem danych szyfruje je lokalnie, a klu... |
## Which one is flag? (trivia, 75p, 89 solves)
> Which one is [flag](flagBag.zip)?
### PL[ENG](#eng-version)
Otrzymujemy plik tekstowy z prawie 300 tysiącami flag. Jednak pierwsze co rzuca się w oczy to po jednym null byte na wiersz.

Sprawdzamy ile tych null byte-ów jest: okazuje się, że o jeden mniej ni... |
## calcexec I (pwn, 200p, 7 solves)
> 2+2 == [5](Calc.exe)? > nc 185.82.202.146 1337
### PL[ENG](#eng-version)
Zadanie to usługa ewaluatora wyrażeń matematycznych napisana w C#. Widzimy, że jedną z funkcji ewalutora jest wypisanie nam flagi.
```csharpcalcEngine.RegisterFunction("FLAG", 0, (p => File.ReadAllText("flag... |
## ones_and_zer0es (crypto, 50p, 987 solves)> [eps1.1_ones-and-zer0es_c4368e65e1883044f3917485ec928173.mpeg](ones-and-zer0es.bin)
### PL Version`for ENG version scroll down`
Pobieramy wskazany plik. Jego zawartość to:
01100110011011000110000101110100011110110101000001100101011011110111000001101100011001010010000001... |
## What's example flag? (triv, 1p)
### PL[ENG](#eng-version)
Przykładowa flaga znajduje się tutaj http://asis-ctf.ir/rules/ :
ASIS{476f20676f6f2e676c2f67776a625466}
Ale nie o nią chodzi. Hexy przypominające hash MD5 są tak naprawdę tekstem zakodowanym w ASCII.
bytes.fromhex('476f20676f6f2e676c2f67776a625466').deco... |
## Bodu (crypto, 175p)
###PL[ENG](#eng-version)
Zostają nam dane [klucz publiczny](pub.key) i [zaszyfrowana wiadomość](flag.enc), zacznijmy od spojrzenia jak wygląda klucz publiczny:

Od razu rzuca się w oczy dosyć spory exponent (najczęściej widzi się należące do liczb pierwszy Fermata, a więc `... |
## Impossible (web, 225p)
### PL[ENG](#eng-version)
Według opisu zadania, flaga jest schowana na stronie http://impossible.asis-ctf.ir/Możemy tam zakładać konta, ale muszą one zostać aktywowane żeby się zalogować.Jak zwykle zaczynamy od ściągnięcia `robots.txt` aby sprawdzić co autorzy strony chcą przed nami ukryć.http... |
# ASIS CTF Final 2015 - Biglie (Forensic, 100pts)
## Problem
We've got pcap file. This is network communication with 0bin.asis.io server, which is a service with encrypted pastebins.
Our goal is to find the flag.
## Solution
Uloaded pastebins are encrypted with Stanford Javascript Crypto Library (SJCL) library (https:/... |
# WhiteHat Contest 10 2015: crypto100
**Category: Cryptography****Points: 100****Solves: 17****Author: WhiteHat Wargame****Description:**
> Do you love Arithmetic?
> [file](crypto100_c3747ddbe535de5601206babb456191b)
## Write-up
by [x0w1](https://github.com/x0w1)
There must be 50 letters encoded in 10 numbers, 5 letter... |
## Hacking Time (re, 200p, 180 solves)
### PL[ENG](#eng-version)
> We’re getting a transmission from someone in the past, find out what he wants. > [HackingTime.nes](HackingTime.nes)
Pobieramy udostępniony plik, który okazuje się obrazem aplikacji na Nintendo Entertainment System, 8-bitową konsolę, którą każdy zna i l... |
### HARD INTERVIEW##### 50 pointsQuestion--`interview.polictf.it:80`Readings--* https://www.youtube.com/watch?v=zfy5dFhw3ik
Answer--We first use `nc` to connect the server and the result is: ```bash$ nc interview.polictf.it 80 ____ __ __ /... |
[](ctf=mma-ctf-2015)[](type=forensics)[](tags=)[](tools=wireshark,gimp)[](techniques=)
# Splitted (forensics-30)
We're given [a pcap file](../splited.pcap), let's go ahead and open it in wireshark. We can easily see that a file called 'flag.zip' is being sent.. Let's filter required packets:> http && ip.src==192.168.4.... |
#K_{Stairs}
**Category:** Web**Points:** 100**Description:**
http://54.152.84.91
##Write-upHitting the site, we are welcomed with the following:

Immediately we register and start looking around.

So, straight off the bat we notice that w... |
<html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system"> <head> <meta charset="utf-8"> <link rel="dns-prefetch" href="https://github.githubassets.com"> <link rel="dns-prefetch" href="https://avatars.githubusercontent.com"> <link rel="dns-prefetch... |
<html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system"> <head> <meta charset="utf-8"> <link rel="dns-prefetch" href="https://github.githubassets.com"> <link rel="dns-prefetch" href="https://avatars.githubusercontent.com"> <link rel="dns-prefetch... |
<span>Open the challenge URL (http://hack-the-planet.hackover.h4q.it) and see that we are presented with a login page. Enter some credentials and we are redirected to the /login page. Enter the URL to the login-page in POSTMAN and set the verb of the request to HEAD.We then see that response returns the header:"X-Hacke... |
## Hackover CTF: Racer
----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| Hackover CTF | Racer | Crypto | 300 |
*Description*> Join the race and make a round. Don't forget to view the winner animation!
----------## Write-up
For ... |
## Puzzleng (forensic, 150p, 24 solves)
> Next Generation of Puzzle!
> [puzzleng-edb16f6134bafb9e8b856b441480c117.tgz](puzzleng.tgz)
### PL[ENG](#eng-version)
Z dołączonego do zadania pliku tgz wypakowujemy dwa kolejne - [encrypt](encrypt) (to binarka, elf) oraz [flag.puzzle](flag.puzzle) (nieznany typ pliku).Łatwo do... |
## Babyfirst (web, 100p, ?? solves)
> baby, do it first.
> http://52.68.245.164
### PL[ENG](#eng-version)
Po połączeniu się pod podany url wyświetla się nam taka strona:
```php
```
Program tworzy folder "sandbox/NASZE_IP" oraz `chdir`uje do niego. Możemy wyświetlić zawartość tego folderu nawigując w przeglądarcedo htt... |
#Simple Crypto solution
## IntroSimpleCrypto was the easiest (least amount of point) crypto problem of the HITCON CTF Quals 2015.
It comes as a simple ruby/sinatra web application that asks you to login, creates a session cookie and then check if there's a flag "admin:true" in your cookie. There's no login per se, jus... |
We are given a cyphertext encrypted with AES-CBC, IV and the beginning of the plaintext. The task is to mangle it so that after decryption the beginning of the plaintext would begin with another given string.All bits that have to be changed are in the 1st block (128 bit). in cbc mode the first block is encrypted this w... |
## Simple (crypro, 100p, 86 solves)
> Become admin! > http://52.69.244.164:51913
> [simple-01018f60e497b8180d6c92237e2b3a67.rb](simple.rb)
### PL[ENG](#eng-version)
Możemy wykonać HTTP `GET` oraz `POST` do podanej usługi. `POST` szyfruje JSONa złożonego z podanego loginu oraz hasła 128-bitowym AESem w trybie CFB. `GE... |
# VolgaCTF Quals 2015: Interstellar
----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| VolgaCTF Quals 2015 | Interstellar | Reversing | 200 |
**Description:**>*interstellar*
>*Just a small binary from a far-far galaxy*
>*[inte... |
[](ctf=hackover-2015)[](type=reverse)[](tags=reverse,recovery)[](tools=binwalk,gdb-peda)
# goto (reverse-150)We have a [zip](../goto-03661d1a42ad20065ef6bfbe5a06287c.tgz) file.Unzipping it gives us a file goto.bin
```bash$ file goto.bin goto.bin: data```data is somewhat nasty for a 150 pt challenge. So I used binwalk o... |
## rsabin - Crypto 314 Problem - Writeup by Robert Xiao (@nneonneo)
### Description
> Classical things?> > rsabin-a51076632142e074947b08396bf35ab2.tgz
### Solution
We are given the flag encrypted with naïve RSA, with a 314-bit modulus and the unusual exponent 31415926535897932384. Furthermore, looking carefully we can ... |
#Lawn Care Simulator
**Category:** Web**Points:** 200**Description:**
http://54.165.252.74:8089/
##Write-upHitting the site, we are welcomed with the following site:

After getting nowhere with the standard web attacks I started to mess with the grass feature which grew the grass lit... |
$ nc 54.199.215.185 9004Hi, I can say 10 bytes :P`. /*/*/?`I think size = 10 is ok to me.cat flag >&2<span>hitcon{It's hard to say where ruby went wrong QwO}</span> |
# writeups
Writeups for CTFs by the team [ByteBandits](https://ctftime.org/team/13691)
All writeups are organized in the pattern:
ctf-name > problem-type > problem-name > author
That is, very similar to that of the repo [writeups](https://github.com/ctfs/write-ups-2015)
The repository also includes a small [search tool... |
[](ctf=hackover-2015)[](type=pwn)[](tags=buffer-overflow,ROP)[](tools=pwntools,gdb-peda)[](techniques=ROP)
# easy-shell (pwn-75)
We have a [zip](../easy_shell-2fdf5e4dea11c1e96f0a81971b096e48.tgz) file.Unzipping it gives us
```bash$ file easy_shelleasy_shell: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dy... |
#whiter0se
**Category:** Crypto**Points:** 50**Description:** Note: The flag is the entire thing decrypted
[eps1.7_wh1ter0se_2b007cf0ba9881d954e85eb475d0d5e4.m4v](eps1.7_wh1ter0se_2b007cf0ba9881d954e85eb475d0d5e4.m4v)
##Write-up
Again, the file is ascii text:
>```root@ctf:~/Downloads/CTF# file eps1.7_wh1ter0se_2b007cf0... |
# Hackover 2015 CTF: yodigga
----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| Hackover CTF | yodigga | Crypto | 500 |
*Description*>Watch out for trolls, they bite.
>`nc yodigga.hackover.h4q.it 1342`
----------
## Write-upAft... |
# moonglow (misc 300)
## Description
```Moonglow is a type of Herb which appears as a bent stalk with a drooping blue-white flower. It grows in Jungle grass (surface Jungle and Underground Jungle) and can be cut with virtually any weapon or tool. It can also be planted in Clay Pots using Moonglow Seeds.
nc 52.69.171.13... |
## precision (pwn, 100p, 272 solves)
### PL[ENG](#eng-version)
> nc 54.173.98.115 1259 > [precision_a8f6f0590c177948fe06c76a1831e650](precision)
Pobieramy udostępnioną binarkę i na początek sprawdzamy jakie utrudnienia przygotowali nam autorzy.
```# checksec.sh --file precisionRELRO STACK CANARY NX ... |
## Fooddb - Pwn 500 Problem - Writeup by Robert Xiao (@nneonneo)
### Description
> Do you want some delicious food ?> nc 52.68.53.28 0xdada> > fooddb-e303c9bc733ca06044a7bd2b6ea12129> libc-3f6aaa980b58f7c7590dee12d731e099.so.6
### Reversing
The program implements a pretty simple "food database" written in C++ which all... |
# matrix X matrix (pwn 175)
## Description
```Matrix is magic!!!nc 52.68.53.28 31337
matrix-a0e5c5c0a8f05896a7f03d8ed4588027libc-3f6aaa980b58f7c7590dee12d731e099.so.6```
## The bugs
In main, the program gets the size of the matrix from user. This value, however, can be negative.
```C ... printf("Hello %s \nThat is a ... |
## Colors (ppc/Programming, 100p)
### PL Version`for ENG version scroll down`
System wyświetlał na stronie internetowej obrazek złożony z kwadratów. Wsystkie kwadraty oprócz jednego miały taki sam kolor - jeden z nich miał lekko inny odcień. Celem zadania było kliknięcie w ten odmienny kwadrat. System rejestrował gdzie... |
# nanana (pwn, web 200)
Nanana was a web challenge with a login form submitting to a CGI script,`/cgi/nanana`. Since this is also a pwnable, we expect that this is abinary. Through some guessing, we find that the binary is available todownload at `/nanana`.
```RELRO STACK CANARY NX PIE ... |
# Piranha Gun (stego 50)
This challenge gives you a shell under some namespaces isolation, and vaguely asks that you find "jungle.chest".
Because you're root in this namespace, you can `mount -t proc proc /proc` to restore procfs to aid in your exploration of this system.
With proc, you can notice that there's a mountp... |
# risky (rev 300)
## Description
```RISKY machine
risky-13de1366628df39000749a782f69d894```
## Reversing
The given binary was a [RISC-V](http://riscv.org/) ELF program that prompts for the correct code. When the correct code is given, the flag is generated and displayed. We couldn't run the binary, so everything was do... |
# Poooooooow - Crypto 200 problem
This challenge is pretty straight forward. We send a number, and the serverwill raise our number to the power of the flag, modulo a large prime number.
We simply note that the order of the group has several small factors (2 as wellas 3 repeated 336 times), which lets us efficiently cal... |
# Use-After-FLEE (pwn, web 500)
Use-After-FLEE was a web challenge allowing you to upload and runarbitrary PHP scripts.
## Poking around
Uploading a script that does `phpinfo()`, we see that the PHP script isrunning with and `open_basedir` of `/var/www/html/:/tmp/` as well as thefollowing functinos in `disable_function... |
##Strange 150 (forensics, 150p)
### PL[ENG](#eng-version)
W tym zadaniu zostanie przetestowana nasza umiejętność otwierania dużych obrazków, dostajemy plik [strange.png](strange.png) ważący 16MB ale pojawia się jeden problem:

Tak, zgadza się, obrazek ma `344987x344987` pikseli, nawet z 1 bitową mapą da... |
# PhishingMe - Misc 200 Problem - Writeup by Erye Hernandez (@eryeh)
### Description```Sent me a .doc, I will open it if your subject is "HITCON 2015"!Find the flag under my file system. p.s. I've enabled Macro for you. ^_________________^[email protected].```Based on the description and problem title, the goal of this... |
# blinkroot (pwn 200)
binary reads 1024 bytes, then closes stdin,stderr,stdout
then there is a MOVAPS to copy 8 bytes of input to a controllable address
so the destination address must be aligned properly
i chose to overwrite pointer to link_map, and provide a fake link_map that
returns the address of system when tryin... |
# Hack.lu 2015 CTF: Bashful### Indonesian version----------
## Detail tantangan| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| Hack.lu CTF | Bashful | Web | 200+50 |
*Deskripsi*> "How did I end up here?" is the only question you can think of... |
## Transfer (forensics, 100p, 541 solves)
### PL[ENG](#eng-version)
> I was sniffing some web traffic for a while, I think i finally got something interesting. Help me find flag through all these packets. > [net_756d631588cb0a400cc16d1848a5f0fb.pcap](transfer.pcap)
Pobrany plik pcap ładujemy do Wiresharka żeby po chwi... |
Hacklu 2015 CTF - Dr. Bob## Details
| Contest | Challenge | Category | Points || :------- | :-------- | :------- | :----- || Hacklu | Dr. Bob | forensics| 150 |
*Description*>There are elections at the moment for the representative of the students and the winner will be announced tomorrow by the head of electio... |
# ASIS CTF Quals 2015: tera
----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| ASIS CTF Quals 2015 | tera | Reversing | 100 |
**Description:**>*Be patient and find the flag in this [file](challenge/tera).*
----------## Write-u... |
[](ctf=hack.lu-2015)[](type=coding)[](tags=random)
# GuessTheNumber (coding-150)
```The teacher of your programming class gave you a tiny little task: just write a guess-my-number script that beats his script. He also gave you some hard facts:he uses some LCG with standard glibc LCG parametersthe LCG is seeded with ser... |
# Hack.lu CTF 2015 - Module Loader (Web, 100pts)
## Problem
100 Points by lucebac (Web)
Since his students never know what date it is and how much time they have until the next homework's deadline, Mr P. H. Porter wrote a little webapp for that.
## Solution
We get simple web application with two available options:

Cały kod szyfrujący jest [tutaj](shiftcrypt.py).Szyfrowanie jest bardzo proste, aż dziwne że zadanie było za 200 punktów. Szyfrowanie polega na podzielen... |
[](ctf=ekoparty-ctf-2015)[](type=reversing)[](tags=malware,control,pickle,RSA)[](tools=Twitter,easy-python-decompiler)[](techniques=Decompiling)
# Malware (rev-200)
We have a [zip](../rev200.zip).Extract and we get
```bash$ file ekobot_final.pyc ekobot_final.pyc: python 2.7 byte-compiled```
Byte-compiled python can be ... |
## Challenge
The teacher of your programming class gave you a tiny little task: just write a guess-my-number script that beats his script. He also gave you some hard facts:
- he uses some LCG with standard glibc LCG parameters - the LCG is seeded with server time using number format YmdHMS (python strftime syntax) ... |
[](ctf=hack.lu-2015)[](type=crypto)[](tags=rsa)
# Creative Cheating (crypto-150)
We have a [pcapng](../dump_2bd6da8de87c6f1170dec710f7268a16.pcapng).Opening it with wireshark we see data packets. Follow the stream and extract it to a [file](str).We see the data is base64'd.
```bashcat str | base64 -d > full```
each lin... |
[](ctf=ekoparty-ctf-2015)[](type=reversing)[](tags=image,C#)[](tools=Telerik-JustDecompile,PIL)[](techniques=no-patch)
# Patch me (rev50)
We have a [zip](../rev50.zip).Extract and we get
```bash$ file *SecureImageViewer.exe: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windowssecureimage.xml: XML ... |
## hard to say - Misc 4x50 Problem - Writeup by Robert Xiao (@nneonneo)
### Description
> Ruby on Fails.> FLAG1: nc 54.199.215.185 9001> FLAG2: nc 54.199.215.185 9002> FLAG3: nc 54.199.215.185 9003> FLAG4: nc 54.199.215.185 9004> > hard_to_say-151ba63da9ef7f11bcbba93657805f85.rb
### Solution
This cute little Ruby progr... |
Hilariously, the program itself is its own inverse. A little bash to handle the base64 decoding, and out pops the flag.<span>python shiftcrypt.py "`echo 'CjBPewYGc2gdD3RpMRNfdDcQX3UGGmhpBxZhYhFlfQA=' | base64 -D`" | base64 -D; echo</span> |
Provided was a VirtualBox machine. When started, VirtualBox asked for a password to decrypt the virtual hard disk.A quick search for cracking VirtualBox's disk encryption, lead to @sinfocol's VBOXDIE-cracker (coincidence?): https://github.com/sinfocol/vboxdie-cracker/ Feeded with the famous rockyou wordlist, the cracke... |
#Module Loader
**Category:** Web**Points:** 100**Description:**
Since his students never know what date it is and how much time they have until the next homework's deadline, Mr P. H. Porter wrote a little webapp for that.
https://school.fluxfingers.net:1522/
##Write-up
We are presented with a site that has two links, o... |
Task URL: http://ctf.link/challenges/1/Contact Me: FB.com/belcaid.mohammedGreetz to: Bilal & HackXore Team & Team b0wa9a & Néss d La Fac & Néss Li mavalidét WaloO#Like + #Subscribe + #Share and Thanks for Watching !! :) |
At first I found that there's an error in password check logic: after each check the value of the right hash (which is read from file before the first check) is overwritten by it's xor with hash of the entered password. So:1) we can enter the same password two times in a row and get the value of the right hash: 0x785e6... |
#Stego 100 - UnreadableUnreadable was a stego problem starting with an unknown file. Piping the file through xxd led us to find the flag "written" in the output with printable characters surrounded by non-printable characters.```....................-Sc(Ezfh<z..........*Y................bV..............R(........PsgOo,.... |
## GuessTheNumber (ppc, 150+80p)
The teacher of your programming class gave you a tiny little task: just write a guess-my-number script that beats his script. He also gave you some hard facts: he uses some LCG with standard glibc LCG parameters the LCG is seeded with server time using number format YmdHMS (python str... |
# babyfirst (web 100)
## Description
```baby, do it first.http://52.68.245.164```
## The bugs
When you browse to the website, you see the PHP code that is running on index page.
```php
```
The program creates a sandbox directory using the `$_SERVER['REMOTE_ADDR']` (aka your IP address) if it doesn't exist already, and ... |
# ASISCTF Finals 2015: ASIS Hash
----------## Challenge details| Contest | Challenge | Category | Points ||:---------------|:--------------|:----------|-------:|| ASISCTF Finals 2015 | ASIS Hash | Reversing | 150 |
**Description:**>*Find the flag in this [file](challenge/hash.elf).*
----------## Write-up... |
## HardToSay (misc, 200p, (111, 88, 73, 28) solves)
Ruby on Fails. FLAG1: nc 54.199.215.185 9001 FLAG2: nc 54.199.215.185 9002 FLAG3: nc 54.199.215.185 9003 FLAG4: nc 54.199.215.185 9004
hard_to_say-151ba63da9ef7f11bcbba93657805f85.rb
### PL[ENG](#eng-version)
Dostajemy taki kod:
```ruby
#!/usr/bin... |
#Secret Library
##by TheJH (Reversing)
> Books are a great thing. And since libraries are a big amount of books you can read in one place, they're great, too.
> But this secret library some guys started is a bit different. You have to know the exact title of a book to get it, you can't look around. So you have to know... |
#Zoo##by TheJH (Reversing)
> Instead of sitting in the classroom, let's go to the zoo today and look at some strange animals! You'll need a license key for entering though. Can you make one?
> connect to school.fluxfingers.net:1532
Due to a silly coding bug I didn't succeed to get the flag from the server on time, how... |
## precision (pwn, 100p, 272 solves)
### PL[ENG](#eng-version)
> nc 54.173.98.115 1259 > [precision_a8f6f0590c177948fe06c76a1831e650](precision)
Pobieramy udostępnioną binarkę i na początek sprawdzamy jakie utrudnienia przygotowali nam autorzy.
```# checksec.sh --file precisionRELRO STACK CANARY NX ... |
Task URL: http://ctf.link/challenges/21/Description:----------------------------------------------------------------------So I hope you're well insured, because the nineties have sent us theirbest thing ever: bright colors and Comic Sans MS. Please end it beforeeveryone dies due to internal bleedings.1.ctf.link:1123--... |
## Challenge
We see a page with a link to the page with the flag at /secret.php but we see get a 403 error when we visit the page:


## Solution
To exploit the filtering we just use the hex value of "secret" in the url:
```%73%65%63%72%65%74.php```
Visit `http://lab2.grandprix.whitehatvn... |
<span>Shitty Security Appliance - 200</span>This is a challenge written by kajer. The Challenge was distributed as a 3GB .OVA file. This .OVA file was a VMware 5.5 export of a "shitty security appliance".The OVA file will extract out to the typical VMware files needed to run a VM. The VMDK contains a boot partition ... |
# Dr. Bob
## Problem
There are elections at the moment for the representative of the students and the winner will be announced tomorrow by the head of elections Dr. Bob. The local schoolyard gang is gambling on the winner and you could really use that extra cash. Luckily, you are able to hack into the mainframe of the ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.