1. TUCTF 2017: Crypto Clock (300)

    We are given a network dump file, network_dump and a service that we can connect to. After we open the file, we find two file was transmitted. The first one is the keys file which contains the following:

    {
    "n":142592923782837889588057810280074407737423643916040668869726059762141765501708356840348112967723017380491537652089235085114921790608646587431612689308433796755742900776477504777927984318043841155548537514797656674327871309567995961808817111092091178333559727506289043092271411929507972666960139142195351097141,
    "e": 3
    }
    

    The second one is a python script file …

    read more
  2. TUCTF 2017: Guestbook (250)

    We are given an ELF executable file, guestbook and a service for the executable. Our goal is to spawn a shell from the service. Decompiling guestbook with IDA will yield this C pseudo-code:

    int __cdecl main(int argc, const char **argv, const char **envp)
    {
      char s; // [sp+0h] [bp-98h]@16 …
    read more

page 1 / 1