Eindbazen - eindbazen.net - Eindbazen

Latest News:

pCTF 2013 – usbdude (for 350) 5 May 2013 | 11:06 pm

For this challenge we’re given a pcap file containing USB traffic. Initial inspection learns us this is a dump of an AVRISP mkII USB programmer for 8-bit AVR microcontrollers. As there’s quite some da...

pCTF 2013 – charsheet (web 150) 4 May 2013 | 03:37 am

My friend is in my D&D campaign – could you get me his character name? He administrates this site. This challenge is a very simple SQL injection, asking for the character name.

pCTF 2013 – secure_reader (pwn 150) 4 May 2013 | 03:32 am

I can’t figure out how to read the flag ssh to 54.224.109.162 The secure_reader program can read the flag, but can only be invoked from the reader program. Additionally, the secure_reader will not rea...

pCTF 2013 – unnnnlucky (misc 20) 4 May 2013 | 03:27 am

Question: Where does The Plague hide his money? This question is clearly a reference to the movie Hackers, we’ve immediately watched the movie on youtube and skipped to the referenced part in the NSA ...

pCTF 2013 – ropasaurusrex (pwn 200) 3 May 2013 | 01:27 am

This is a very simple network service which will overflow a stack buffer if you send it too much data. The stack is non-executable, which we can get around using Return-Oriented Programming (which is ...

pCTF 2013 – cone (binary 250) 28 Apr 2013 | 08:13 pm

Cone is an obfuscated binary which reads a key from stdin and either approves it or denies it. After reading our magic instruction trace we found out that the underlying algorithm of this binary consi...

pCTF 2013 – prove it (misc 150) 28 Apr 2013 | 03:30 pm

We’ve been reading about bitcoins. We were given a service that asked us to provide an input that would result in an md5 with a given prefix of 52-bits. At first we were looking at modifying an existi...

pCTF 2013 – blech (crypto 200) 27 Apr 2013 | 04:02 pm

You get arbitrary code execution…. as long as it’s code we approve of. This challenge consisted of a service which allowed running arbitrary python code, as long as you had a valid RSA signature for i...

pCTF 2013 – hypercomputer-1 (bin 100) 27 Apr 2013 | 01:42 pm

hypercomputer-1 For those who didn’t play plaidCTF 2012: “supercomputer” was a reversing challenge that computed flags using really silly math (like adding in a loop instead of mulitplication). hyperc...

pCTF 2013 – pyjail (misc 400) 27 Apr 2013 | 01:38 am

We did not solve this challenge in time, despite spending a lot of time on it. If we had we would have taken 1st place, but of course there’s always that one challenge you wish you had solved… Still, ...

Recently parsed news:

Recent searches: