InCTF 2017 : Browse? Writeup

Challenge created by sh1v First of thanks to Jim Shaver as the challenge was inspired from this blog. Initially we have a memory dump. On analysing it in volatility using imageinfo plugin we get to know that the memory dump is of Windows 7. Then on further analysis of the processes listed using the pslist... Continue Reading →

Advertisements

InCTF 2017- ‘RSA 1s Fun’ Writeup

Author: s0rc3r3r Points: 150 Mathematics and Crypto make a deadly combination! Intended Solution The challenge, as the description suggests, involves applying mathematics to solve the RSA based encryption system. The encryption code: Two different public keys e1 = 9 and e2 = 123 are being used to encrypt the same message and generate ciphertexts c1... Continue Reading →

InCTF 2017: Warmup Pwn Writeup

Author: sg004 This was a simple challenge made to make the solver think. Hope you had fun doing it! 🙂 Let us first look at the protections enabled on the binary: NX is enabled so shellcode injection is not possible. The buffer overflow is apparent from the disassembly. There is a read call of 0x80... Continue Reading →

Hack.lu CTF : bit Writeup

Solved by sherl0ck For this challenge we were given a 64 bit, stripped ELF binary. The protections enabled were - $ checksec bit CANARY : ENABLED FORTIFY : disabled NX : ENABLED PIE : disabled RELRO : FULL As will be seen, enabling NX and Relro has no effect on the exploit ! The disassembly... Continue Reading →

Hack.lu 2017 Exam Write up

Solved by 4rbit3r This was the first challenge that I attempted from Hack.lu. It was a relatively easy challenge compared to the other higher point challenges. The binary is 64 bit and has the following protections enabled CANARY : ENABLED FORTIFY : disabled NX : ENABLED PIE : ENABLED RELRO : FULL Thankfully, the binary... Continue Reading →

SEC-T CTF: G1bs0n Writeup

Solved by sh1v and sherl0ck First of all kudos to the admins for conducting such a great CTF. The challenges were really cool and we had loads of fun solving them. Now getting to this particular challenge, we were given a 326 MB file, which when unpacked, amounted to about 1.1 GB. We were told... Continue Reading →

Adhrit: Android APK Reconnaissance Tool

Introduction: When Android started ruling the mobile markets with millions of applications and open source ROM projects, lot of security issues were tailing the world's largest mobile market dominator. The count of malwares detected has been continually improving on large malware databases. The need of this moment is an approach to tackle this situation which... Continue Reading →

CSAW Quals 2017: Zone Writeup

In this challenge we were given 64 bit, dynamically linked, stripped LSB executable. First let's take a look at the protections enforced on the binary : gdb-peda$ checksec CANARY : ENABLED FORTIFY : disabled NX : ENABLED PIE : disabled RELRO : Partial Okay, so only Canary and NX. Now coming to the binary ,... Continue Reading →

Blog at WordPress.com.

Up ↑