1. pwnable.kr: aeg (550)

    We are given an endpoint which we can connect to. The endpoint gives the following banner right after we connected:

    ---------------------------------------------------
    -  Welcome to AEG (Automatic Exploit Generation)  -
    ---------------------------------------------------
    I will send you a newly compiled binary (probably exploitable) in base64 format
    after you get the binary, I will be waiting for your …
    read more
  2. pwnable.kr: rootkit (400)

    We are given a Linux Kernel Module named rootkit and a remote QEMU guest over ssh. Inside the remote QEMU guest, there's a file named flag which we can't open. There's also rootkit.ko which has the same hash digest as rootkit. Inspecting the syslog, there's a line which says …

    read more

page 1 / 1