1. MeePwn CTF 2017: |\/|/-\T|-| (100)

    We are given a file, hack.py, which looks as follows.

    from Crypto.Util.number import *
    from hashlib import md5
    
    flag = "XXX"
    assert len(flag) == 4
    pad = bytes_to_long(md5(flag).digest())
    
    hack = 0
    
    for char in flag:
        hack+= pad
        hack*= ord(char)
    
    print hack
    print pad
    print hack % pad
    #hack …
    read more
  2. BTRFS: Access Beyond End of Device

    TL;DR: There's a problem in my filesystem and it made my important file corrupted.


    What's the scariest thing that happened in your life?

    In this post I want to share one of the scariest thing that happened to me: BTRFS filesystem suddenly attempt to access beyond end of device …

    read more
  3. Implementation vs Design

    In my school, there's a common dogma that software implementation is easy, the hard part is designing. This dogma emerge as I take software engineering classes. The lecturers keep a big emphasize on how cool to design a software and how lame to implement a software. For me, I always …

    read more

page 3 / 3