Skip to content

Instantly share code, notes, and snippets.

@dual5651
dual5651 / gist:32b4bc5139108c3b8c7be95c1005b9bb
Last active October 12, 2017 02:44
pwnable.kr - fd - writeup
Mommy! what is a file descriptor in Linux?
* try to play the wargame your self but if you are ABSOLUTE beginner, follow this tutorial link:
https://www.youtube.com/watch?v=blAxTfcW9VU
ssh fd@pwnable.kr -p2222 (pw:guest)
----------------------------------------------------------------------------------------------------
@dual5651
dual5651 / gist:c168f34ee464d77f18cfa0c4aa631f8a
Last active October 12, 2017 04:01
pwnable.kr - col - writeup
Daddy told me about cool MD5 hash collision today.
I wanna do something like that too!
ssh col@pwnable.kr -p2222 (pw:guest)
------------------------------------------------------------------------------------------------
mtrlpq3015w-lp130-01-70-30-167-203:~ dual5651$ ssh col@pwnable.kr -p2222
col@pwnable.kr's password:
____ __ __ ____ ____ ____ _ ___ __ _ ____
@dual5651
dual5651 / gist:21a683cd0c2c710da0bf4e937634b0da
Created October 12, 2017 02:43
pwnable.kr - bof - writeup
Nana told me that buffer overflow is one of the most common software vulnerability.
Is that true?
Download : http://pwnable.kr/bin/bof
Download : http://pwnable.kr/bin/bof.c
Running at : nc pwnable.kr 9000
---------------------------------------------------------------------------------------------
Papa brought me a packed present! let's open it.
Download : http://pwnable.kr/bin/flag
This is reversing task. all you need is binary
---------------------------------------------------------------------------
mtrlpq3015w-lp130-01-70-30-167-203:~ dual5651$ ssh fd@pwnable.kr -p2222
fd@pwnable.kr's password:
@dual5651
dual5651 / gist:4681ff531dba24228c6b997e0469a89d
Created October 12, 2017 05:11
pwnable.kr - passcode - writeup
Mommy told me to make a passcode based login system.
My initial C code was compiled without any error!
Well, there was some compiler warning, but who cares about that?
ssh passcode@pwnable.kr -p2222 (pw:guest)
--------------------------------------------------------------------------
mtrlpq3015w-lp130-01-70-30-167-203:~ dual5651$ ssh passcode@pwnable.kr -p2222
passcode@pwnable.kr's password:
@dual5651
dual5651 / gist:e6151a900431a329c1332860e34f6407
Last active October 12, 2017 05:24
pwnable.kr - random - writeup
Daddy, teach me how to use random value in programming!
ssh random@pwnable.kr -p2222 (pw:guest)
--------------------------------------------------------------------
mtrlpq3015w-lp130-01-70-30-167-203:~ dual5651$ ssh random@pwnable.kr -p2222
random@pwnable.kr's password:
____ __ __ ____ ____ ____ _ ___ __ _ ____
| \| |__| || \ / || \ | | / _] | |/ ]| \
@dual5651
dual5651 / gist:73c4f047b644a83c1659855dc78c88e2
Created October 12, 2017 05:49
pwnable.kr - input - writeup
Mom? how can I pass my input to a computer program?
ssh input2@pwnable.kr -p2222 (pw:guest)
-----------------------------------------------------------------
mtrlpq3015w-lp130-01-70-30-167-203:~ dual5651$ ssh input2@pwnable.kr -p2222
input2@pwnable.kr's password:
____ __ __ ____ ____ ____ _ ___ __ _ ____
| \| |__| || \ / || \ | | / _] | |/ ]| \
@dual5651
dual5651 / gist:6e6395226f2ab48ed7190205754977e7
Last active September 1, 2018 14:06
pwnable.kr - leg - writeup
Daddy told me I should study arm.
But I prefer to study my leg!
Download : http://pwnable.kr/bin/leg.c
Download : http://pwnable.kr/bin/leg.asm
ssh leg@pwnable.kr -p2222 (pw:guest)
-------------------------------------------------------------------
@dual5651
dual5651 / gist:453e47efbadf872c37d355ca6ce2c1a8
Created October 12, 2017 06:07
pwnable.kr - mistake - writeup
We all make mistakes, let's move on.
(don't take this too seriously, no fancy hacking skill is required at all)
This task is based on real event
Thanks to dhmonkey
hint : operator priority
ssh mistake@pwnable.kr -p2222 (pw:guest)
@dual5651
dual5651 / gist:e6d35869e6b689d65bff0032edbf876b
Created October 12, 2017 06:10
pwnable.kr - shellshocked - writeup
Mommy, there was a shocking news about bash.
I bet you already know, but lets just make it sure :)
ssh shellshock@pwnable.kr -p2222 (pw:guest)
----------------------------------------------------------------
mtrlpq3015w-lp130-01-70-30-167-203:~ dual5651$ ssh shellshock@pwnable.kr -p2222
shellshock@pwnable.kr's password: