Fork me on GitHub
  1. TinyCTF - Rev 200

    1

    Finally with Rev200 I was able to get into the more challenging flags! I really enjoyed this one as it let me reflect on my glory Android developer days, if you could consider it as such!

    Running file on the challenge file indicated it was a zip archive, but considering ...

    Read more...


  2. TinyCTF - Misc 100

    1

    This challenge involved, as the challenge named hinted at, some sort of password cracking operation to capture the flag. The challenge file was a password protected zip file. I utilized fcrackzip to help me out (Figure 1).

    fcrackzip -v -D -u -p ~/wordlists/rockyou.txt misc100
    

    2

    The password was found ...

    Read more...


  3. TinyCTF - Misc 10

    1

    The file for this challenge contained an alpha-numeric string. I ran the file contents through a hash identifier and nothing got picked up. Taking a closer look at the string, it looked as though all of the values were within the range of ASCII characters represented in hex (I have ...

    Read more...


  4. CSAW 2014 - Fluffy No More

    Fluffy No More was a Forensics 300 point challenge at CSAW 2014. The backstory seemed kind of funny and I thought I'd give it a shot!

    1

    Setup

    The attached tarball contained a few additional tarballs:

    • Full /etc directory contents
    • Full /var/log directory contents
    • Full /var/www directory contents ...

    Read more...


  5. CSAW 2014 - pybabbies

    pybabbies was an Exploitation 200 challenge during the CTF and I got "voluntold" to work on this one by my team mates since I have a strong Python background. The night was young and I felt pretty good about it, so I took a look.

    1

    Setting the scene

    Connecting to ...

    Read more...


« Page 2 / 4 »