text_chunk
stringlengths
151
703k
```# -*- coding: utf8 -*-from pwn import *context.log_level='debug'SERVER="crabby-clicker.ctf.umasscybersec.org"PORT=80 payload=b"GET /click HTTP/1.1\r\n\r\n" p = remote(SERVER, PORT)for i in range(0, 101): p.send(payload) payload=b"GET /flag HTTP/1.1\r\n\r\n"p.send(payload)recv = p.recvall()print(recv)``` // UMASS{...
%25%36%36%25%36%63%25%36%31%25%36%37%25%37%62%25%33%38%25%36%35%25%36%36%25%36%35%25%36%32%25%33%36%25%33%36%25%36%31%25%33%37%25%33%31%25%33%39%25%36%32%25%33%37%25%33%35%25%36%31%25%33%34%25%36%32%25%33%37%25%36%33%25%33%36%25%33%33%25%33%34%25%36%34%25%33%38%25%33%38%25%33%35%25%33%37%25%33%38%25%33%38%25%36%34%2...
# runner-net >Great work cracking that pcap file! I think we saw some interesting traffic, and we were definitely onto something with Dr Tom's blog. Unfortunately - security seems tight.>>But fortunately for us - people are the weakest link and some people might still be celebrating st. paddy's based on this network ca...
## PQ- Tags: Crypto- Description: Sup! I have a warm-up exercise for you. Test yourself! ## Solution- To solve this question you need to download the two files and open them. One contains a script, another contains an output after encryption process.- This is a RSA encryption. RSA is a type of asymmetric encryption, wh...
tl;dr- Slice files.js using nginx partial caching.- Use Subresource Integrity to load the right script- Use DOM clobbering and Cache probing to leak the flag uuid
## Made Sense- Tags: Misc, Makekjail, Jail- Description: i couldn't log in to my server so my friend kindly spun up a server to let me test makefiles. at least, they thought i couldn't log in :P ## Solution- When we visit that website, we can see there a link to source code of it. ```import osfrom pathlib import Pathim...
# Fair RSA Category: Cryptography Files:- details.txt ## Description This is a challenge to test your cryptography knowledege in RSA, we have provided you with the details below what you need to do is decrypt the message that is encrypted and submit the plaintext here after you are done. `author : @tahaafarooq` ## deta...
# Deleted> We found this file and was told that it contains a flag within it. Can you find the flag? The file we are given is a `.e01` which I loaded with [Autopsy](https://www.autopsy.com/). Once I loaded the file, I checked the 'deleted files' section. ![autopsy.png](https://seall.dev/images/ctfs/tamuctf2024/autopsy....
Can you survive the gauntlet? 10 mini web challenges are all that stand between you and the flag. Note: Automated tools like sqlmap and dirbuster are not allowed (and will not be helpful anyway). [https://gauntlet-okntin33tq-ul.a.run.app](https://gauntlet-okntin33tq-ul.a.run.app) --- Challenge 1: ```Welcome to the ...
## babypwn- Tags: pwn- Description: Just a little baby pwn. nc babypwn.wolvctf.io 1337 ## Solution- To solve this question you need to download the following files and open the source code. You will see the following: ```#include <stdio.h>#include <string.h>#include <unistd.h> struct __attribute__((__packed__)) data { ...
# Crypto: TwoTimePad > Author: cogsworth64 > > Description: One-time pads are perfectly information-theoretically secure, so I should be safe, right? [chall.py](https://github.com/nopedawn/CTF/blob/main/WolvCTF24/Beginner-TwoTimePad/chall.py) [eFlag.bmp](https://github.com/nopedawn/CTF/blob/main/WolvCTF24/Begi...
# SMP> We'd call it Bedwars but we suck at Bedwars too much. Now this challenge we didn't technically 'solve' during the CTF but we had the flag and didn't think we had a full solve, interpreting it as a partial flag as our code originally cut off the top of the flag. The file we are given is a `smp.log` which seems to...
As soon as we open the site, we notice that we have to beat a certain score, and when we click on the cookie, it increases. ![cookie clicker](https://raw.githubusercontent.com/GerlachSnezka/utctf/main/assets/2024-web-cookie-clicker.png) We can start by inspecting the website using dev tools and we'll find this piece of...