You might remember my first Maximum Overkill writeup, where I made a ROP exploit with ASLR/NX bypass for a simple buffer overflow exercise. I completed another over-the-top, why-would-you-even-do-this exploit for a CTF challenge and figured I’d shared it.
Solving the X86-64 Shellcoding Challenges of RingZer0CTF
RingZer0Team is hosting a long-term CTF. The shellcoding challenges presented a very nice set of challenges. It was really fun and I learned a ton about 64-bit shellcoding while solving them!
(Semi) Weekly Roundup 2015 #3
So maybe ‘weekly’ isn’t really the right word for these posts ;]
By the Numbers - theFrequency Writeup
Within a few days of releasing thePurge, strata decided to release yet another VM! This one was called theFrequency… It presents a very nice challenge involving radio signal encoding and audio stego. I needed several hints to solve this one, but it was worth it!
Weekly Roundup 2015 #2
A bit later and shorter than planned due to the CTF, but here’s another weekly roundup!
HackIM CTF - Sbox
Quirky little challenge, this sbox
. We’re actually given the keys to the kingdom right away!
HackIM CTF - MentalNote
mentalnote
was a 400 point exploitation-type challenge in NullCon’s HackIM CTF.
HackIM CTF - Mixme
mixme
was a 400 points exploitation challenge of the NullCon HackIM ctf. We solved it with just 20 minutes on the clock!
Weekly Roundup 2015 #1
Time for another weekly round-up of interesting links!
31C3 CTF - Cfy
Man, 31C3 CTF was tough. I managed to get this flag, worth 10 points. Seems I need to keep learning ;] Let’s have a look at cfy
.