PwnDiary

Everything about security

[CBM CTF 2019] secure_login Write-up (Reverse85)

can you login to this secret_login program cbe1369d57cd131d6d5b1787d02511c6.zip Let’s look at the file information first.

Let’s run the program once to see what it does.

It has register and login features. After decompiling it, I noticed the following… Continue Reading →

[SpamAndFlags Teaser CTF 2019] Forumz Write-up (Web252)

Time to take a break from CTFing and browse some forums instead! Forum When we visit the link, we encounter a forum website. Since the registration is closed and we cannot create a new account, I decided to visit the… Continue Reading →

[ASIS CTF Finals 2018] Silver Bullet Write-up (Pwn121)

You’ve got one silver bullet, pull the triggle carefully! nc 37.139.17.37 7331 Let’s check the file information first.

The file is an ELF 32-bit LSB executable. Let’s look at its protections.

Its stack is not executable. Let’s decompile… Continue Reading →

[TUCTF 2018] Lisa Write-up (Pwn489)

Ayo, Johhny’s got your take from the job. Go meet up with em’ to claim your share. Oh, and stop asking to see the Mona Lisa alright. It’s embarrassing nc 18.191.244.121 12345 lisa Let’s check the file information first.

Continue Reading →

[Kaspersky Industrial CTF 2018] Glardomos Write-up (Reverse587)

Find the flag inside the binary Glardomos.exe Let’s check the file information.

It is a 32-bit .NET executable file. Let’s try to decompile it.

The binary is heavily obfuscated with ConfuserEx v1.0.0.¬†We need to unpack and deobfuscate this… Continue Reading →

[Kaspersky Industrial CTF 2018] Doubles Write-up (Pwn635)

nc doubles.2018.ctf.kaspersky.com 10001 doubles Let’s start with looking at file information and protections.

The file is an 64-bit executable that is dynamically linked and its stack is not executable. Let’s disassemble its main function.

It simply calls a… Continue Reading →

« Older posts

Copyright © 2019 PwnDiary