I hereby claim:
- I am hugsy on github.
- I am hugsy (https://keybase.io/hugsy) on keybase.
- I have a public key ASAk2OzRftLhep2ooIFPk2HLJdc3r_HQy6DPwtanNCyjHAo
To claim this, I am signing this object:
#!/usr/bin/env python2 | |
# | |
# beatmeonthedl Baby's First, 324 points' | |
# I really like to be beaten but keep it on the dl. | |
# Connect to: | |
# beatmeonthedl_498e7cad3320af23962c78c7ebe47e16.quals.shallweplayaga.me 6969 | |
# | |
# | |
from pwn import * |
#!/usr/bin/env python2 | |
# | |
# | |
# bigpicture [pwn 200] PlaidCTF 2017 | |
# | |
# $ ./bigpicture.py bigpicture.chal.pwning.xxx 420 | |
# [+] Opening connection to bigpicture.chal.pwning.xxx on port 420: Done | |
# [*] Starting '/ctf/plaidctf_2017/bigpicture/bigpicture' remotely | |
# [*] leaking libc | |
# [+] libc_addr = 0x7ff7b167ac70 |
I hereby claim:
To claim this, I am signing this object:
# | |
# csaw 2016 - hungman - pwn 300 | |
# | |
# @_hugsy_ & @rick2600 | |
# | |
from pwn import * | |
context.update(arch="amd64", os="linux", log_level = "info") | |
import random, string, time |
# @_hugsy_ | |
# $ python bf.py | |
# Pass 0 | |
# [...] | |
# Pass 27 | |
# Pass 28 | |
# Pass 29 | |
# ///////////////////////////////// | |
# Do not be angry. Happy Hacking :) | |
# ///////////////////////////////// |
# | |
# CSAW 2016 - pwn 200 - tutorial | |
# | |
# @_hugsy_ | |
# | |
# tutorial@9c7e30ba54b6:/home/tutorial$ ls | |
# ~/cur/tutorial $ py xpl.py | |
# [+] Opening connection to pwn.chal.csaw.io on port 8002: Done | |
# [*] Got 0x7f60e48eb860 | |
# [*] libc is 0x7f60e487c000 |
#!/usr/bin/python | |
# | |
# @_hugsy_ | |
# | |
# $ python /tmp/uni.py | |
# >>> init randint is d6 | |
# The flag is TWCTF{5UBS717U710N_C1PH3R_W17H_R4ND0M123D_5-B0X} | |
# | |
import unicorn |
#!/usr/bin/python2 | |
# [+] Opening connection to 172.28.128.3 on port 1338: Done | |
# [*] Smash null byte | |
# [*] Reading from memory | |
# [*] Leaked puts@glibc at 0xb7665650 | |
# [*] system@glibc is at 0xb7640190 | |
# [*] Overwriting puts@got with system@glibc | |
# [*] Triggering | |
# [*] Switching to interactive mode |
abandoned | |
able | |
absolute | |
adorable | |
adventurous | |
academic | |
acceptable | |
acclaimed | |
accomplished | |
accurate |
#!/usr/bin/env python2 | |
# | |
# ARMpwn challenge exploit (kudos & thx to 5aelo) | |
# | |
# writeup: https://blahcat.github.io/2016/06/13/armpwn-challenge/ | |
# | |
# @_hugsy_ | |
# | |
from pwn import * |