Eindbazen - eindbazen.net - Eindbazen
General Information:
Latest News:
pCTF 2013 – usbdude (for 350) 5 May 2013 | 11:06 pm
For this challenge we’re given a pcap file containing USB traffic. Initial inspection learns us this is a dump of an AVRISP mkII USB programmer for 8-bit AVR microcontrollers. As there’s quite some da...
pCTF 2013 – charsheet (web 150) 4 May 2013 | 03:37 am
My friend is in my D&D campaign – could you get me his character name? He administrates this site. This challenge is a very simple SQL injection, asking for the character name.
pCTF 2013 – secure_reader (pwn 150) 4 May 2013 | 03:32 am
I can’t figure out how to read the flag ssh to 54.224.109.162 The secure_reader program can read the flag, but can only be invoked from the reader program. Additionally, the secure_reader will not rea...
pCTF 2013 – unnnnlucky (misc 20) 4 May 2013 | 03:27 am
Question: Where does The Plague hide his money? This question is clearly a reference to the movie Hackers, we’ve immediately watched the movie on youtube and skipped to the referenced part in the NSA ...
pCTF 2013 – ropasaurusrex (pwn 200) 3 May 2013 | 01:27 am
This is a very simple network service which will overflow a stack buffer if you send it too much data. The stack is non-executable, which we can get around using Return-Oriented Programming (which is ...
pCTF 2013 – cone (binary 250) 28 Apr 2013 | 08:13 pm
Cone is an obfuscated binary which reads a key from stdin and either approves it or denies it. After reading our magic instruction trace we found out that the underlying algorithm of this binary consi...
pCTF 2013 – prove it (misc 150) 28 Apr 2013 | 03:30 pm
We’ve been reading about bitcoins. We were given a service that asked us to provide an input that would result in an md5 with a given prefix of 52-bits. At first we were looking at modifying an existi...
pCTF 2013 – blech (crypto 200) 27 Apr 2013 | 04:02 pm
You get arbitrary code execution…. as long as it’s code we approve of. This challenge consisted of a service which allowed running arbitrary python code, as long as you had a valid RSA signature for i...
pCTF 2013 – hypercomputer-1 (bin 100) 27 Apr 2013 | 01:42 pm
hypercomputer-1 For those who didn’t play plaidCTF 2012: “supercomputer” was a reversing challenge that computed flags using really silly math (like adding in a loop instead of mulitplication). hyperc...
pCTF 2013 – pyjail (misc 400) 27 Apr 2013 | 01:38 am
We did not solve this challenge in time, despite spending a lot of time on it. If we had we would have taken 1st place, but of course there’s always that one challenge you wish you had solved… Still, ...