Hello, Here are my write-ups for the X-MAS CTF 2019 organized by https://htsp.ro/. Reversing: Santa's crackme Santa's crackme is easy to solve when using Ghidra, all you need to do is open up the binary, read the code and use the XOR Memory script from Ghidra. The flag is retrieved from flag_matrix and xored by … Continue reading X-MAS CTF 2019: Binary Exploiting & Reversing Write-Ups
Hello, Here's my write-up for the Traverxec machine. Initial Shell: google User Hint: Read the configuration carefully and `ls` dem directories, and don't forget, you're the web server! Root Hint: In linux you can configure commands to be executed without requiring a password. The password for the PDF is the root flag. Link: BananaPr1nc3-Traverxec.pdf
Hello, Here's my write-up for the Reversing DSYM challenge from HackTheBox. PDF: https://1drv.ms/b/s!ApWG8dlpzmQV-F7NJOZ2GJ0-f0ZJ The password for the Write-Up is the challenge's flag. To solve it I've used: https://ghidra-sre.org/https://gchq.github.io/CyberChef/ Write a comment if you need a hint or something is not clear. Thanks for reading!
There is no excerpt because this is a protected post.