You can read my write-up at the Hardc0de team blog.You just need to put 2 numbers in ascending order without spaces.Reverse Code Engineering — 200
btsync: BNBPTYNHZR2FGRLULM5G3XHT4T6XDZK4E
direct link
Going deeper into Computer Security
Wednesday, 2 April 2014
VolgaCTF Quals 2014 - Reverse 200
Thursday, 26 December 2013
[Reverse] Simple code deoptimization
In this post I would like to write about code deoptimization strategies and where it may be needed.
First of all there is quite a little use of deoptimization and that is why I haven't found anything about it in the Internet. Usually developer should write the fastest running code that is possible. Therefore if he/she writes very inefficient code that will cause program to delay on simple functions and that developer will be fired or noone will accept such performance.
First of all there is quite a little use of deoptimization and that is why I haven't found anything about it in the Internet. Usually developer should write the fastest running code that is possible. Therefore if he/she writes very inefficient code that will cause program to delay on simple functions and that developer will be fired or noone will accept such performance.
Sunday, 17 November 2013
Saturday, 16 November 2013
Friday, 8 November 2013
Crackmes [Reverse write-up] - Trojaner's Patch/InjectMe write-up (DLL injection)
Task from crackmes:
Patch or Inject it with a DLL, so that it will show the goodboy message :)
Happy Hacking!
Friday, 25 October 2013
Hacklu CTF 2013 - Reverse 150 - RoboAuth
Task:
Oh boy, those crazy robots can't catch a break! Now they're even stealing our liquid gold from one of our beer tents! And on top of that they lock it behind some authentication system. Quick! Access it before they consume all of our precious beverage!
Download: https://ctf.fluxfingers.net/static/downloads/roboauth/RoboAuth.exe
Flag: password1_password2
Thursday, 3 October 2013
Sharif CTF Quals 2013 - Exploiting 200 - sweet
Task:
This service accepts our input and echoes it using variant of printf function. As you might have already understood there will be a format string vulnerability.nc ctf.sharif.edu 15478
Subscribe to:
Posts (Atom)