Purpose : Get The Flag Unleashing the ROP Chain and Hijacking the GOT Vulnerable Code Protection Exploit #!/usr/bin/python3 from pwn import * import struct # context.terminal = ['tmux','sp...
Nahm , NahamCon 2023
Description : The program is designed to work with a specific file. First, it prompts the user to enter the name of the file. If the file name matches the keyword “flag,” the program terminates im...
Exploiting Seccomp-Restricted Program to Leak a Flag
Purpose : Get The Flag Introduction: The purpose of this write-up is to explain the process of exploiting a seccomp-restricted program to leak a secret. Seccomp is a mechanism in Linux that restri...
knock_neighbout , NahamCon 2023
Description: The program generates a random value at runtime using the current time as the seed. It then prompts the user for input and compares it to the previously generated random value. If the ...
Little Hero Khi Qualifier 2022
Using strings.exe was able to findout its dotnet binary . Opening in dnspyx86 (32-bit binary). After navigating to main funcion we can see that form function is being called. using System; using S...
Encryptor hackathon lhr Qualifier 2022
After Opening Binary in ghidra get to know that it’s C++ Binary. Converted it into python to get clear insight as to what binary is doing. #!/usr/bin/python3 def second_algo(data): local_data...
Hack The Boo pwn.pumpkin 2022
Purpose : Get The Flag challenge ** main ** void main(void) { int iVar1; size_t input_len_int; long in_FS_OFFSET; ulong local_int; undefined8 input_user_string; undefined4 local_...
Hack The Boo pwn.Entity 2022
Purpose : Get The Flag Challenge #include <stdio.h> #include <stdlib.h> #include <string.h> static union { unsigned long long integer; char string[8]; } DataStore; t...
Malicious Zip
Purpose : Analyzing The Malware Behaviour Suspicious rar contains 3 files 2 are cleared and 1 (file).lnk is malicious {Deduce after investigation }. lets start investigation .(58ec917b5d2e14846f...
Format pcc.nccs_final 2022
Purpose : Get The Flag Checking binary security measures. Source Code is given. Reading through it we can see that flag is loaded and saved to the flag variable on the stack.Pointer to flag var...