Summary: This was one of the beginner challenges for UIUCTF 2022. Use fake image headers to disguise a php script as an image, upload it and get the flag.
We made it easy to add a frame to your digital art!
https://frame-web.chal.uiuc.tf/
#!/bin/bash | |
# by me | |
CODE="ZZZ" | |
if [[ $# -lt 1 ]]; then | |
read -p "Enter nearest airport code: " | |
else | |
CODE="${1}" | |
fi |
#!/usr/bin/env python3 | |
"""(c) copyright 2023 Daniel Ha | |
Permission is hereby granted, free of charge, to any person obtaining a copy of | |
this software and associated documentation files (the “Software”), to deal in | |
the Software without restriction, including without limitation the rights to | |
use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies | |
of the Software, and to permit persons to whom the Software is furnished to do | |
so, subject to the following conditions: |
package main | |
import ( | |
"flag" | |
"fmt" | |
"log" | |
"os" | |
"os/signal" | |
"strconv" |
writeup by downbtn
Quick summary: A fairly straightforward buffer overflow pwn challenge. Smash the stack and overwrite the saved instruction pointer with a value provided by the program. In this writeup I've tried to write in such a way that someone who is very new to CTFs and has little experience with pwn could understand my full reasoning. This means that a veteran player might find this writeup a bit tedious to read, but I hope y'all can bear with me :^)
Pwn Warmup
Points: 50
#!/usr/bin/env python | |
MORSE_CODE_DICT = { | |
'A': '.-', | |
'B': '-...', | |
'C': '-.-.', | |
'D': '-..', | |
'E': '.', | |
'F': '..-.', | |
'G': '--.', |