bi0s
  •  Home
  •  Categories
  •  Archives
  •  Tags
  •  Home
  •  Categories
  •  Archives
  •  Tags

Easy Husky - ISITDTU Quals 2019

stuxn3t
2019-07-08
Forensics / Memory

tl;dr - Volatility + Corrupted file analysis
Full solution of Easy Husky challenge from ISITDTU Quals 2019.

Read More
Windows Memory Analysis

MicroServiceDaemonOS - GoogleCTF Quals 2019

sherl0ck
2019-07-01
Pwn

tl;dr

Out of bounds write in trustlet ‘1’, allows us to write random bytes at an address of
our choice. We can write our shellcode to an rwx region with this, without any bruteforce.

Note: During the CTF we used a 1 byte brute-force to get write shellcode in the rwx segment and get shell. It was only afterwards that we realised that no bruteforce was required!

Read More
GoogleCTF OOB

Copychall - Acebear CTF 2019

R3x
2019-04-25
Reversing / Linux

tl;dr

  • You need to pass 999 levels to get the flag.
  • Each of the levels involves multiple checks on input characters.
  • Each check happens in seperate functions which are decrypted during runtime.
  • Extract function order and arguments.
  • Automate finding input for each check.
Read More
Linux Reversing

Halloween Party - ASIS CTF Quals 2019

s0rc3r3r
2019-04-23
Crypto / Elliptic-Curves

tl;dr

  1. Find Elliptic Curve parameters from given points on the curve
  2. Find x-coordinate of 2*P, given y-coordinate of 2*P
  3. Invert 2 over mod (P.order()) and multiply the result with 2*P to get P
  4. Submit ASIS{P.x} as the flag
Read More

EZDSA - MidnightSun CTF Quals 2019

s0rc3r3r
2019-04-09
Crypto / Digital-Signatures

Full solution of EZDSA challenge from MidnightSun CTF Quals 2019.

tl;dr retrieving key using Euler’s Criterion to break signature authentication

Read More
Euler NumberTheory PublicKeyCrypto

Blind - Volga CTF Qualifiers 2019

s0rc3r3r
2019-03-31
Crypto / Digital-Signatures

tl;dr solving RSA Digital Signature using it’s homomorphic property:

  1. Calculate the signature of factors of message M to be signed, separately
  2. Combine them by multiplication over modulus to get the signature of M
Read More

Reasonably Suspicious Acronym - Teaser CONFidence 2019

s0rc3r3r
2019-03-18
Crypto / PubKey-Enc

tl;dr Coppersmith’s Attack to recover RSA primes

Read More
RSA Coppersmith

Bro do you even Lift - Teaser CONFidence CTF 2019

v4d3r
2019-03-18
Crypto

tl;dr

  1. Find roots in a polynomial ring over $ mod;p $
  2. Use Hensel’s Lifting lemma to find roots over $ mod;p^k $
Read More
PolynomialRing HenselLifting

Count me in - Teaser CONFidence CTF 2019

v3ct0r
2019-03-18
Crypto / Block-Ciphers

tl;dr Known plaintext attack on a multithreaded AES-CTR

Read More
AES-CTR

Alice sent Bob a meme - UTCTF 2019

s0rc3r3r
2019-03-12
Crypto / Elliptic-Curves

tl;dr

  1. Extract data from given images using binwalk
  2. Tranform given diophantine equation into a cubic curve and retrieve EC parameters
  3. Solve ECDLP given in extracted data using Pohlig Hellman Algorithm
Read More
ECDLP PohligHellman

 Previous 

18 / 19

 Next 

Official blog of team bi0s

  Projects
  •   bi0s-wargame
    (Unraveling)
  •   bi0s-wiki
    (Free Encyclopedia)
  •   InCTF
    (Nationals CTF)
  •   InCTFj
    (Juniors CTF)

Made With Love and Coffee



Blog content follows the Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

Use Material X as theme, total visits times.