Hacking Tube

Site no longer updated. Migrated to https://bruce30262.github.io/

Posts match “ Python ” tag:

CSAW CTF 2014 -- Exploitation 400 saturn

| Comments

First the challenge gave us a binary file (ELF for Intel-386). But we can't execute it, cause we don't have the required shared library "libchallengeresponse.so". So we will have to launch IDA Pro to see what's going on within the program.

0CTF 2015 Quals -- (Baby)PolyQuine

| Comments

Different people see different me.
But I am always myself.

Make the output of your program exactly the same as your source code.
All 5 correct required to get this flag (Only need 3 correct for BabyPolyQuine)

$python2 --version
Python 2.7.6

$python3 --version
Python 3.4.0

$gcc --version
gcc (Ubuntu 4.8.2-19ubuntu1) 4.8.2

$ruby --version
ruby 1.9.3p484 (2013-11-22 revision 43786) [x86_64-linux]

$perl --version
This is perl 5, version 18, subversion 2 (v5.18.2) built for x86_64-linux-gnu-thread-multi

VolgaCTF 2015 Quals -- my little pwnie

| Comments

Category: Pwn
Points: 250

Just another pwn task. Break in!
nc pwnie.2015.volgactf.ru 7777

I solve the challenge after the end of the CTF, because I think this is a great challenge for practicing format string and sprintf BOF vulnerability. Special thanks to Lays for putting the exploit on the trello and let me have time to study the challenge.

ASIS CTF 2015 Quals -- grids

| Comments

Category: Programming
Points: 300

In each stage send the maximun size of area that can be covered by given points as a vertex of polygon in 2D.
nc 12433
mirror 1 : nc 12432
mirror 2 : nc 12434
mirror 2 : nc 12429

ASIS CTF 2015 Quals -- Saw this (1 & 2)

| Comments

Category: pwn
Points: 100 (Saw this-1), 400 (Saw this-2)

Survive and get the flag!
Note: This challenge contains two flags, one of them is easier to fetch, the other is harder.
The easier flag will be clearly indicated as "Flag 1", the harder flag as "Flag 2"
nc 31337