PwnDiary

Everything about security

Category

Write-ups

Capture The Flag write-ups

[Redpwn CTF 2019] Stop, ROP, n’, Roll Write-up (Pwn280)

There’s not really much I can say about this challenge… The bytes speak for themselves. Good luck!!! nc chall2.2019.redpwn.net 4008 srnr Let’s look at the file information first.

It is a dynamically linked ELF 64-bit executable. Now, let’s look… Continue Reading →

[CBM CTF 2019] secure_login Write-up (Reverse85)

can you login to this secret_login program cbe1369d57cd131d6d5b1787d02511c6.zip Let’s look at the file information first.

Let’s run the program once to see what it does.

It has register and login features. After decompiling it, I noticed the following… Continue Reading →

[SpamAndFlags Teaser CTF 2019] Forumz Write-up (Web252)

Time to take a break from CTFing and browse some forums instead! Forum When we visit the link, we encounter a forum website. Since the registration is closed and we cannot create a new account, I decided to visit the… Continue Reading →

[ASIS CTF Finals 2018] Silver Bullet Write-up (Pwn121)

You’ve got one silver bullet, pull the triggle carefully! nc 37.139.17.37 7331 Let’s check the file information first.

The file is an ELF 32-bit LSB executable. Let’s look at its protections.

Its stack is not executable. Let’s decompile… Continue Reading →

[TUCTF 2018] Lisa Write-up (Pwn489)

Ayo, Johhny’s got your take from the job. Go meet up with em’ to claim your share. Oh, and stop asking to see the Mona Lisa alright. It’s embarrassing nc 18.191.244.121 12345 lisa Let’s check the file information first.

Continue Reading →

[Kaspersky Industrial CTF 2018] Glardomos Write-up (Reverse587)

Find the flag inside the binary Glardomos.exe Let’s check the file information.

It is a 32-bit .NET executable file. Let’s try to decompile it.

The binary is heavily obfuscated with ConfuserEx v1.0.0.¬†We need to unpack and deobfuscate this… Continue Reading →

Copyright © 2019 PwnDiary