- It's telnet packet and it's not encrypted so we can easily see packet
- Flag:
flag{d316759c281bf925d600be698a4973d5}
- It's pcap file but if you try to open it with wireshark you can't get enough information.
- If you search all strings with 'string' command you can see very wierd mark and it's flag.
- Flag:
flag{f9b43c9e9c05be5e08ea163007af5144}
- I think it's kind of steganography problem.
- There are two kind of white in this problem. One is pure white (255, 255, 255) and other is almost white(254, 254, 254).
- So Change almost white to black then you can get flag
- Flag:
{forensics_is_fun}
- If you type drink all the booze, google suggest
drink all the booze hack all the things - Flag:
hack
- If you googling researchers name You can find issues title.
- Flag:
DARPA
- Flag:
gadget
- If you googling full duplex communication over a single connection web server web browser you can find new protocol
- Flag:
websocket
- If you googling x86 processor operating mode for running 64-bit code you can find mode name
- Flag:
long mode
- It's wierd image. If you tried to open file it saids it's corrupted.
- If you check png with pngchecker you can see crc error in idhr
- Now let's change CRC to FCC410A8
- In text chunk it saids this piture is taken by iphone 5 so apply that ratio to width and height.
- CRC changed again so we have to change CRC to F754DA63
- Flag:
TheISISPasswordIs
- It's network overflow.
- At
0x0804886arecv function called, max_length is 0x3fc. - If we change $ebp-0xc we can get key file value. Distance between recv buffer and $ebp-0xc is 0x3f8.
- 0x3f8 is less than 0x3fc so we can easily overflow it.
- Flag:
{7c1fbb502632bffa6e62ba6fa847681f}
- In this question it's easy to exploit as first question.
- payload may be like this `[shellcode]+'A'*(0x800-len(shellcode))+[secret]+'A'*12+[ret_addr]
- secret value is generated randomly and we have to send it correctly to overflow this question. ret_addr shoud be address of shellcode
- We can get both values. Program send 4bytes of shellcode addr and 4bytes for secret value.
- It's socket exploit so we need to use reverse shell or bind shell. I choose to use bind shell and find appropriate shellcode at 'here'
- I uploaded my python script at 'here'
- Flag:
{53666e040caa855a9b27194c82a26366}