- Clusters: Compute resources that run containerized applications
- Pods: Homogenenous set of containers that share data with a constraint which is to be deployed on the same cluster
- Replication Controllers: Engaged in management of lifecycle of pods, thus they (in a way) check if a specific number of pods are running all the time.
- Services: Basically load balancers that abstract a logical set of pods. Engaged in routing traffic to one of the pods.
- Labels: Identifiers that filter out pods(homogenous) to perform common tasks.
Privilege level
- EL3 -> Secure Monitor
- EL2 -> Hypervisor
- EL1 -> OS Kernel
- EL0 -> Userspace/Applications
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
r%uD 92AA6?[ AC:K6D 5:D2AA62CW2 76H @7 E96>X] | |
x7 J@F 2C6 2??@F?4:?8 D@>6E9:?8[ >2<6 DFC6 J@F 5@ E92E 2E E96 6?5 @7 E96 r%u] ~E96CH:D6[ :E CF:?D E96 E6>A6C2>6?E @7 A=2J6CD] |
Questions(asked previously) - Dec/20:
- What's the math behind qubit measurement?
- How feasible do you think your project is?
- Briefly explain shor's algorithm.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
import angr | |
import claripy | |
if __name__ == '__main__': | |
print("[+] Solver Started") | |
binary = "./babymix" | |
flag_length = 0x16 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from z3 import * | |
st = [BitVec(f'{i}', 8) for i in range(0x27)] | |
s = Solver() | |
s.add(st[0x00]^st[0x02]^st[0x04]==0x60) | |
s.add(st[0x04]^st[0x06]^st[0x08]==0x36) | |
s.add(st[0x08]^st[0x0a]^st[0x0c]==0x71) | |
s.add(st[0x0c]^st[0x0e]^st[0x10]==0x32) | |
s.add(st[0x10]^st[0x12]^st[0x14]==0x3f) | |
s.add(st[0x14]^st[0x16]^st[0x18]==0x01) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$Key = 92,48,90,2,7,5,1,9,8,8,6,75,39,2,45,6,3,7,7,20,56,71,5,5 | |
$encoded = "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" | |
(New-Object System.Net.NetworkCredential("", (ConvertTo-SecureString -k $Key $encoded))).Password |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from simon import SimonCipher | |
my_simon = SimonCipher(0xABBBAAABAABAAABAAABABAABAAABABBA) | |
simon_ciphertext = 0xDCD9D598AE2990D31F230F3BE7813716 | |
simon_plaintext = my_simon.decrypt(simon_ciphertext) | |
print(hex(simon_plaintext)[2:]) | |
#note that this is in base36 format |
- the
.tgs
file is a telegram sticker - send it to the sticker bot on telegram to render it, or convert it to another format. The animation shows 6 characters "mrgr3y"
.tgs
format is essentially a gzipped JSON. Get the JSON by usinggzip -d
- Load the JSON to see that there's a key named
sandwich
. The contents of this key is a long hex string. Decode this into bytes and save it to file. - This file is a 7z file protected with a password. Use the password
mrgr3y
- You'll get a file
flag.RDxR10
- That's a shell archive. Execute it :
./flag.RDxR10
- You get the flag encoded in grey code.