InCTF 2017: warm_heap pwn Writeup

Author: 4rbit3r Hello, this was a nice challenge from InCTF 2017, let's see how to get the exploit working. As usual, running checksec on the binary gives: Nothing much here, let us look at the program itself. It is a menu driven program with some basic functionalities: Add note Edit note Remove note View note These... Continue Reading →

Advertisements

InCTF 2017 : sort Writeup

Author: sherl0ck This CTF was organized by bi0s itself and was the first international edition of InCTF. The binary was a 32-bit, statically linked and unstripped. Here are it's permissions - CANARY : disabled FORTIFY : disabled NX : ENABLED PIE : disabled RELRO : Partial The executable was basically implementing a bubble sort algorithm. The sort... Continue Reading →

InCTF 2017- Multi-Layer RSA writeup

Author: s0rc3r3r Points: 100 Intended Solution This is probably the easiest challenge in the Crypto section in InCTF.  The encryption script: As we can see, the encryption is layered, after the message is encrypted using the first public key i.e. first element of 'encryption_keys', the result is then encrypted with the next public key i.e.... Continue Reading →

InCTF 2017 : Browse? Writeup

Challenge created by sh1v First of thanks to Jim Shaver as the challenge was inspired from this blog. Initially we have a memory dump. On analysing it in volatility using imageinfo plugin we get to know that the memory dump is of Windows 7. Then on further analysis of the processes listed using the pslist... Continue Reading →

InCTF 2017- ‘RSA 1s Fun’ Writeup

Author: s0rc3r3r Points: 150 Mathematics and Crypto make a deadly combination! Intended Solution The challenge, as the description suggests, involves applying mathematics to solve the RSA based encryption system. The encryption code: Two different public keys e1 = 9 and e2 = 123 are being used to encrypt the same message and generate ciphertexts c1... Continue Reading →

InCTF 2017: Warmup Pwn Writeup

Author: sg004 This was a simple challenge made to make the solver think. Hope you had fun doing it! 🙂 Let us first look at the protections enabled on the binary: NX is enabled so shellcode injection is not possible. The buffer overflow is apparent from the disassembly. There is a read call of 0x80... Continue Reading →

Hack.lu CTF : bit Writeup

Solved by sherl0ck For this challenge we were given a 64 bit, stripped ELF binary. The protections enabled were - $ checksec bit CANARY : ENABLED FORTIFY : disabled NX : ENABLED PIE : disabled RELRO : FULL As will be seen, enabling NX and Relro has no effect on the exploit ! The disassembly... Continue Reading →

Hack.lu 2017 Exam Write up

Solved by 4rbit3r This was the first challenge that I attempted from Hack.lu. It was a relatively easy challenge compared to the other higher point challenges. The binary is 64 bit and has the following protections enabled CANARY : ENABLED FORTIFY : disabled NX : ENABLED PIE : ENABLED RELRO : FULL Thankfully, the binary... Continue Reading →

Create a free website or blog at WordPress.com.

Up ↑