PwnDiary

Everything about security

Month

November 2018

[ASIS CTF Finals 2018] Silver Bullet Write-up (Pwn121)

You’ve got one silver bullet, pull the triggle carefully! nc 37.139.17.37 7331 Let’s check the file information first.

The file is an ELF 32-bit LSB executable. Let’s look at its protections.

Its stack is not executable. Let’s decompile… Continue Reading →

[TUCTF 2018] Lisa Write-up (Pwn489)

Ayo, Johhny’s got your take from the job. Go meet up with em’ to claim your share. Oh, and stop asking to see the Mona Lisa alright. It’s embarrassing nc 18.191.244.121 12345 lisa Let’s check the file information first.

Continue Reading →

[Kaspersky Industrial CTF 2018] Glardomos Write-up (Reverse587)

Find the flag inside the binary Glardomos.exe Let’s check the file information.

It is a 32-bit .NET executable file. Let’s try to decompile it.

The binary is heavily obfuscated with ConfuserEx v1.0.0.¬†We need to unpack and deobfuscate this… Continue Reading →

[Kaspersky Industrial CTF 2018] Doubles Write-up (Pwn635)

nc doubles.2018.ctf.kaspersky.com 10001 doubles Let’s start with looking at file information and protections.

The file is an 64-bit executable that is dynamically linked and its stack is not executable. Let’s disassemble its main function.

It simply calls a… Continue Reading →

[Kaspersky Industrial CTF 2018] Expression Write-up (Web50)

http://expression.2018.ctf.kaspersky.com/ The website allows us to send two numbers/tokens and an operation among +, -, *, /. Let’s send 1 + 2 to test it.

It calculated to result and give us a token which is clearly base64 encoded…. Continue Reading →

Copyright © 2018 PwnDiary