Write-Up redpwnCTF 2020 – fetusmaze

Fetusmaze Overview We are given a binary written in assembly, so the decompilation produced by ghidra at first is quite bad. The code at the entry point is simple, so after a bit of analysis we discover it simply asks for input, calls a function and prints the flag if the return value is 1. […]

Read more
Write-Up C0r0n4CON Fwhibbit CTF – Prison Heap 2

Prison Heap 2 This was the second of two amazing challenges about heap exploiting made by @javierprtd. As it is more difficult, you are expected to have a bit more of understanding about how heap works. Amazing and well know resource with different exploitation techniques: how2heap. Changes I noticed two major differences from the first […]

Read more
Write-Up C0r0n4CON Fwhibbit CTF – Prison Heap

Prison heap This was the first of two amazing challenges about heap exploiting made by @javierprtd. I think it was relatively easy and good as entry point for those willing to start in heap exploiting. I won’t cover all the basics so I recommend taking a look at these two amazing resources: this and this. […]

Read more
Write-Up nn9ed CTF – Moon Casino

Descripci贸n Our casino is under construction. Warm up yourself with this easy challenge! http://casino.nn9ed.ka0labs.org/ Write-up Cuando entramos en la web vemos lo siguiente: Como a simple vista solo tenemos una imagen de la luna, hacemos Ctrl+U para echarle un vistazo al c贸digo fuente: Destaca el comentario, con el que averiguamos que existe el atributo source […]

Read more
Write-Up INS’HACK2019 – Ropberry

Description You hack this guy on challenge called gimme-your-shell, but he is still always asking me the same question when I try to find his secret. Maybe you can do something.He is waiting for you at: ssh -i <your_keyfile> -p 2226 user@ropberry.ctf.insecurity-insa.fr To find your keyfile, look into your profile on this website.Category: pwnFile: here Analysis This challenge […]

Read more