AceBear CTF 19

I had a lot of fun and a hard time during this CTF, but the challenges are really awesome. I spent the whole time solving one challenge: Incident Response. In my opinion, this challenge closely resembles a real-life scenario and I’m glad that I’ve learned a lot out of it. So here goes the write up for it! Incident Response - Misc 1000 1. Memory forensics - Identifying the malicious program In this challenge, we’re given a network capture and a memory dump of a Windows machine.

Read more

TetCTF 19

Web - IQTest2 (unsolved) Pwn - Easy webserver (unsolved) Pwn - Babysandbox Pwn - Babyheap Pwn - Babyfirst Web IQTest2 After looking at the source code, there is a path that we can polute the $level variable to pass. It has to pass several condition check: if (isset($_COOKIE['saved']) && !empty($_COOKIE['saved']) && isset($_COOKIE['hash']) && !empty($_COOKIE['hash'])) { $saved = base64_decode($_COOKIE["saved"]); $seed = urldecode(substr($saved, 5 )); } if( md5($GLOBALS['secret'].

Read more

35C3 CTF

This is my first time participating in C3 CTF. Although I wasn’t able to solve many challenges within the time of the CTF, I still find the challenges really awesome and exciting. I wanted to solve pwnable challenges with the hope to learn more about exploit development of real applications, but ended up solving 2 RE ones. Here is my writeup for them :) RE - Corebot This challenge is a 32-bit Windows binary.

Read more

CSAW CTF 2017 Qualification

pwn: pilot (75 pts.) English version here Vietnamese Năm nay mình có cơ hội chơi CSAW CTF một cách thực sự, với hy vọng team đủ khỏe để vào final North America lần nữa. Qua một năm được các tiền bối thông não (quangltm và anh tuanit96), mình đã quẩy được vài bài khá cơ bản. Đây là bài đầu tiên mình owned trong giờ thi. Bài này là một bài buffer overflow cơ bản.

Read more