Fancy Cache was another “Master Challenge” for PicoCTF. It featured a custom server, which allegedly creates a cache of strings. It’s up to us to break it!
PicoCTF - Hardcore ROP
Our team, vulnhub-ctf, joined picoctf
to improve our skills and learn a thing or two. There were many challenges, among which a few “Master Challenges” worth 200 points. This is a story of how we tackled hardcore_rop
. The challenge promises ASLR, NX, PIE and what-have-you, so let’s get cracking!
PicoCTF Write-Ups
We managed to grab all of PicoCTF the flags and we ended with a 6105 point total score! Here are writeups of bitpuzzle, crudecrypt, low_entropy, makeaface, massive_fail, netsino, nevernote, no_overflow, obfuscation and web-interception. Lots of binary exploitation, reverse engineering and even some crypto!
We Need to Go Deeper: Kvasir Writeup
I was asked to test Rasta Mouse’s awesome VM called Kvasir some time ago, which I always find an honor. I figured it was time to do a writeup!
Defcamp CTF: Network 200
This writeup is about Defcamp CTF’s Network 200. Again, we get a clue!
That ****ing manager got smarter. He moved to house number 22, but we got this: ****managers.pcap
Defcamp CTF: Web 300
We are again given an ip address. Upon visiting, it turns out to be some rudimentary page. I immediately spotted a LFI vulnerability, surfing to http://10.13.37.13/?page=../../../../../../etc/passwd
.
Defcamp CTF: Network 100
For this challenge, we’re given the following clue:
My manager lives at 10.13.37.21. Any guest is always welcome. But he has a secret. Can you find it out?
A secret? Let’s dig in!
ASIS-CTF: Secure Hobby
For Secure Hobby, a 250 point challenge, we were given a file and a place to connect to. The archive contained a binary, which looked okay enough to run. It opened a port on localhost. Upon connecting using nc
, the program first crashes because it can’t find flag
and namak
. After creating those files and connecting again, we are presented with the following:
ASIS-CTF: Lottery
Lottery was a 100 point web challenge in the ASIS Finals CTF. The description only said ‘Go here: http://asis-ctf.ir:12437’. That webpage was mostly non-functional, but said that the 1234567890th visitor would win a prize. Gee, I wonder what that is? My browser informed me that there were no cookies, but I wasn’t convinced.
Hack.lu the Union Write-up
Hack.lu 2014 was a very fun, western-themed CTF. For the Union
, we were given an executable and a place to connect to. We need to find secret.txt
and the hint is that “not everything is what it seems”. Uh-huh.