[DragonSector Teaser:Production] Analyzing C sources.
The task. original link attach ctftime Analyzing the source. The only file we were given is lyrics.cc. Let’s make a quick walk-through. static bool list_songs() { char buffer[32] = ...
The task. original link attach ctftime Analyzing the source. The only file we were given is lyrics.cc. Let’s make a quick walk-through. static bool list_songs() { char buffer[32] = ...
The task. original link attach ctftime The bug. Let’s run the app. The first address it shows 0xffb4a578, is array address on the stack, so it’s probably a hint to exploiting approa...
orig link ctftime file Initial analysis reveals some C++ code, and 4 parts of the flag, which is read from user sequentially. AES128. The first check is aes related. You could find a...
Orgs link ctftime binary backup The bug The original vulnerability is the format string. The protections are weak, so the task should not be very hard. x64 format string Original...
Original task ctftime We are given by inter.exe file, which is: inter.exe: PE32 executable (console) Intel 80386, for MS Windows Let’s analyze the file with a disassembler. The first th...
Hello all, this is my unfinished write-up for the challenge from google ctf. I know that this is a little bit dumb to post unfinished work, but I made some progress, and want to share it with someo...
[Google CTF:sftp] Randomized heap :D The challenge. This is the chall from google ctf named sftp. The task was relatively easy (60 solves), but I managed to fail it for the first time, and only w...
Intro. Hello! This is write-up from Mates CTF for numbers task. We are given by numbers.exe binary, that wanted from us to give some numbers: >numbers.exe ----- The Numbers ----- Designed by Q...
In case you are not familiar with VM-stuff, here is short description: In code obfuscation, a virtual machine is a mechanism used to execute a different instruction set than the one used by the ...
This is the task from RCTF 2018, babyre (sources). Input files and data Let’s see what we got. We had two files, one of which is ELF64, other out is simple text: B80C91FE70573EFE BEED92AE7F7A8193...