bi0s
  •  Home
  •  Categories
  •  Archives
  •  Tags
  •  Home
  •  Categories
  •  Archives
  •  Tags

WriteOnly - Google CTF 2020

Cyb0rG
2020-08-24
Pwn / Sandbox

tl;dr

  • Execute shellcode on parent and write to child’s memory using /proc/<pid of child>/mem
  • Overwrite return address of child with execve shellcode and pop shell.
Read More
Shellcode Seccomp Write to child memory GoogleCTF

Secure Note - InCTF Internationals 2020

4lph4
2020-08-14
Misc

tl;dr

  • Challenge involves Reversing, Web, and Crypto
  • Reverse the binary to get the endpoints
  • Trigger the XSS bug in the website and get admin cookie
  • Use Hash Length extension attack to get authenticated as admin and get the flag
Read More
InCTFi Master Challenge

Invisible Maze- InCTF Internationals 2020

officialcjunior
2020-08-14
Misc

tl;dr

  • Challenge is a Nintendo GameBoy ROM image.
  • Reverse the ROM and figure out the implementation
  • Analyze the calling function’s checks to find the path along which we must move.
Read More
InCTFi Gameboy

MIX & MASH - InCTF Internationals 2020

v3ct0r
2020-08-14
Crypto

tl;dr

  • Extract higher bits of secret using input manipulation
  • Extract lower bits of secret using the highers bits and input manipulation
Read More
InCTFi

Reversing - InCTF Internationals 2020

4le31
2020-08-14
Reversing

A brief write-up detailing solutions of Reversing Challenges from InCTF Internationals 2020

Read More
InCTFi

P1ayground - InCTF Internationals 2020

leArner
2020-08-14
Reversing / Windows

A brief write-up of the intended solution of P1ayground challenge from InCTF Internationals 2020

tl;dr

  • Challenge is based on function hooking at runtime.
  • On reversing you will find 4 functions at the same address but executing different code(basically hooked at runtime).
  • Jump inside each function, reverse the algorithms to pass the checks.
  • Ignore the FAKE flag check.
Read More
InCTFi Windows Reversing APIhooking

Pwncry - InCTF Internationals 2020

rudyerudite
2020-08-09
Pwn / Linux / ELF

tl;dr

  • Passing corrupted ciphertext to get the symmetric key leak
  • Fastbin link corruption
  • Exploiting double free and UAF in the heap
Read More
InCTFi

Secret Service - InCTF Internationals 2020

Cyb0rG
2020-08-06
Pwn / Exploitation

tl;dr

  • Use format String to get into secret service.
  • Get libc leaks by overwriting mapped bit of a free chunk.
  • Overwrite the Thread Local Block , thus overwriting canary to get buffer overflow.
Read More
InCTFi Format String TCB overwrite Calloc Malefacerum

LOGarithm - InCTF Internationals 2020

stuxn3t
2020-08-04
Forensics / Memory

tl;dr

  • Extract keylogger script from the memory dump.
  • Extract the master key from the packet capture.
  • Reverse the script to get the flag.
Read More
InCTFi Windows Memory Analysis

No Shake - InCTF Internationals 2020

m0n574
2020-08-04
Web Exploitation / TLS

tl;dr

  • Extract key from the admin by STARTTLS downgrade on the message
  • Deserialize using references to get next phase
  • Deserialization to RCE to get flag
Read More

 Previous 

13 / 19

 Next 

Official blog of team bi0s

  Projects
  •   bi0s-wargame
    (Unraveling)
  •   bi0s-wiki
    (Free Encyclopedia)
  •   InCTF
    (Nationals CTF)
  •   InCTFj
    (Juniors CTF)

Made With Love and Coffee



Blog content follows the Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

Use Material X as theme, total visits times.