bi0s
  •  Home
  •  Categories
  •  Archives
  •  Tags
  •  Home
  •  Categories
  •  Archives
  •  Tags

MIX & MASH - InCTF Internationals 2020

v3ct0r
2020-08-14
Crypto

tl;dr

  • Extract higher bits of secret using input manipulation
  • Extract lower bits of secret using the highers bits and input manipulation
Read More
InCTFi

Reversing - InCTF Internationals 2020

4le31
2020-08-14
Reversing

A brief write-up detailing solutions of Reversing Challenges from InCTF Internationals 2020

Read More
InCTFi

P1ayground - InCTF Internationals 2020

leArner
2020-08-14
Reversing / Windows

A brief write-up of the intended solution of P1ayground challenge from InCTF Internationals 2020

tl;dr

  • Challenge is based on function hooking at runtime.
  • On reversing you will find 4 functions at the same address but executing different code(basically hooked at runtime).
  • Jump inside each function, reverse the algorithms to pass the checks.
  • Ignore the FAKE flag check.
Read More
InCTFi Windows Reversing APIhooking

Pwncry - InCTF Internationals 2020

rudyerudite
2020-08-09
Pwn / Linux / ELF

tl;dr

  • Passing corrupted ciphertext to get the symmetric key leak
  • Fastbin link corruption
  • Exploiting double free and UAF in the heap
Read More
InCTFi

Secret Service - InCTF Internationals 2020

Cyb0rG
2020-08-06
Pwn / Exploitation

tl;dr

  • Use format String to get into secret service.
  • Get libc leaks by overwriting mapped bit of a free chunk.
  • Overwrite the Thread Local Block , thus overwriting canary to get buffer overflow.
Read More
InCTFi Format String TCB overwrite Calloc Malefacerum

LOGarithm - InCTF Internationals 2020

stuxn3t
2020-08-04
Forensics / Memory

tl;dr

  • Extract keylogger script from the memory dump.
  • Extract the master key from the packet capture.
  • Reverse the script to get the flag.
Read More
InCTFi Windows Memory Analysis

Investigation Continues - InCTF Internationals 2020

stuxn3t
2020-08-04
Forensics / Memory

tl;dr

  • Extract Invalid Login timestamp from the windows registry.
  • Extract the timestamp of when a JPEG was opened.
  • Extract Google Chrome’s last run time which was pinned to taskbar from windows registry.
Read More
InCTFi Volatility Windows Memory Analysis Windows Registry

Investigation - InCTF Internationals 2020

stuxn3t
2020-08-04
Forensics / Memory

tl;dr

  • Extract process last run time from the windows registry.
  • Extract process run count from the windows registry.
Read More
InCTFi Volatility Windows Memory Analysis Windows Registry

Lookout Foxy - InCTF Internationals 2020

g4rud4
2020-08-03
Forensics / Disk

tl;dr

  • Decrypt the encrypted GPG file found in Outlook Express with the private key stored on the device.
  • Decrypt the firefox saved passwords and log in to the website that the terrorist used.
Read More
InCTFi Autopsy

Faulty LFSR - InCTF Internationals 2020

ph03n1x
2020-08-02
Crypto / LFSR

tl;dr

  1. Find the co-relation between variables in the LFSR equation
    1. d == out (75%)
    2. a == b (75%)
    3. c^d == out (75%)
    4. (d!= out) => (c==1) always
  2. Solve for the seed using 2000 output bits
  3. Try out which among the four possible combinations decrypt the flag
Read More
InCTFi LFSR Correlation attack

 Previous 

3 / 4

 Next 

Official blog of team bi0s

  Projects
  •   bi0s-wargame
    (Unraveling)
  •   bi0s-wiki
    (Free Encyclopedia)
  •   InCTF
    (Nationals CTF)
  •   InCTFj
    (Juniors CTF)

Made With Love and Coffee



Blog content follows the Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

Use Material X as theme, total visits times.