- If we open elf file with gdb, we can find
AAAAAAAAAAAAAAAAAAAAAAAAAAand we can guess correct pw is that - Password(Not Flag):
AAAAAAAAAAAAAAAAAAAAAAAAAA
- It's not encrypted so we can see packet easily.
- Computer user id is
csawand password iswelcome to 1969
- It has FSB in program.
- Using FSB and backdoor shellcode you can get flag
- pcap file is really large however with wiresharks filter function we can find target packet.
- Flag is in packet with is start with Si.
- Flag:
brooklyn beat box
- This two png files image content is exactly same, however file size is different. Wierd!
- I tried to open it but PIL module couldn't open it so I tried to open it with hex edit.
- There are many tEXt chunk in each file. I googling it little bit and find it's related with CRC error problem.
- If you check tEXt chunk with pngcheck tool some text occur error.
- version1 occur only one error and it's the flag
- version2 occur only one correct text, other things all occur error so one correct is flag
- version1's flag:
takeuchi gregory - version2's flag:
johnnie tigger
- As problem file name, file type is linux x64 core dump file.
- I tried to open it with hex editor and can find key.
- Flag:
this_should_be_pretty_hard_unless_you_use_grep