Write-Up C0r0n4CON Fwhibbit CTF – Prison Heap 2

Prison Heap 2 This was the second of two amazing challenges about heap exploiting made by @javierprtd. As it is more difficult, you are expected to have a bit more of understanding about how heap works. Amazing and well know resource with different exploitation techniques: how2heap. Changes I noticed two major differences from the first […]

Read more
Write-Up C0r0n4CON Fwhibbit CTF – Prison Heap

Prison heap This was the first of two amazing challenges about heap exploiting made by @javierprtd. I think it was relatively easy and good as entry point for those willing to start in heap exploiting. I won’t cover all the basics so I recommend taking a look at these two amazing resources: this and this. […]

Read more
Write-Up nn9ed CTF – Moon Casino

Descripción Our casino is under construction. Warm up yourself with this easy challenge! http://casino.nn9ed.ka0labs.org/ Write-up Cuando entramos en la web vemos lo siguiente: Como a simple vista solo tenemos una imagen de la luna, hacemos Ctrl+U para echarle un vistazo al código fuente: Destaca el comentario, con el que averiguamos que existe el atributo source […]

Read more
Write-Up INS’HACK2019 – Ropberry

Description You hack this guy on challenge called gimme-your-shell, but he is still always asking me the same question when I try to find his secret. Maybe you can do something.He is waiting for you at: ssh -i <your_keyfile> -p 2226 user@ropberry.ctf.insecurity-insa.fr To find your keyfile, look into your profile on this website.Category: pwnFile: here Analysis This challenge […]

Read more
Write-Up WPICTF2019 – Secureshell

Description I made the most secure remote shell there is!nc secureshell.wpictf.xyz 31337 (or 31338 or 31339)Category: pwnAuthor: awgFile: hereAuthors of the Write-Up: Klecko and JlXip Analysis For the analysis part we’re going to use a disassembler. Any will do, but I will be using Hopper Disassembler. We are given a 64-bit ELF executable. When executed, […]

Read more