Navigation Menu

Skip to content

Instantly share code, notes, and snippets.

@icchy
icchy / exploit.py
Created March 16, 2016 02:11
Boston Key Party CTF 2016 segsh (pwn 6pts)
#!/usr/bin/env python
from pwn import *
context(os='linux', arch='i386')
# context.log_level = 'debug'
HOST = "segsh.bostonkey.party"
PORT = 8888
conn = None
@icchy
icchy / solve.log
Created March 21, 2016 02:24
BCTF 2016 hsab 250pts
~/D/c/b/hsab ❯❯❯ python solve.py
[+] Opening connection to 104.199.132.199 on port 2222: Done
[*] Switching to interactive mode
-bash-4.4$ $ bash -v /home/ctf/flag.ray
bash -v /home/ctf/flag.ray
#BCTF{ipreferzshtobash}
-bash-4.4$ server: timeout
[*] Got EOF while reading in interactive
$
/*
gcc -m32 -fno-stack-protector $@
*/
#include <unistd.h>
int main()
{
char buf[100];
int size;
read(0, &size, 4);
@icchy
icchy / .zshfunc
Created April 9, 2016 14:49
like vagrant
function vm_debian() {
case "$1" in
start)
/usr/local/bin/VBoxManage startvm "debian" --type headless
;;
stop|poweroff)
/usr/local/bin/VBoxManage controlvm "debian" acpipowerbutton
;;
status)
/usr/local/bin/VBoxManage showvminfo "debian" | grep "State"
@icchy
icchy / result
Last active May 30, 2016 17:32
セキュリティ・キャンプ2016 選択課題4
PASS
PASS
PASS
PASS
PASS
PASS
PASS
PASS
PASS
REJECTED
@icchy
icchy / solve.py
Created July 18, 2016 14:43
katagaitai #5 関東med crypt.1 hashme
from math import sin
from urlparse import parse_qs
from base64 import b64encode
from base64 import b64decode
from re import match
from pwn import remote, context
# context.log_level = 'debug'
USER = 'icchy'
@icchy
icchy / attack.cpp
Created July 20, 2016 04:36
katagaitai #5 関東med crypt.3 parlor
#include <iostream>
#include <sstream>
#include <iomanip>
#include <algorithm>
#include <cstring>
#include <cassert>
#include <vector>
#include <thread>
#include <mutex>
#include "md5.cpp"
@icchy
icchy / .zshfunc
Last active May 2, 2018 20:15
zshfunc
function prezto-update() {
olddir=`pwd`
cd ~/.zprezto && git pull && git submodule update --init --recursive
cd $olddir
}
function swap() {
mv $1 .$1.myswp
mv $2 $1
mv .$1.myswp $2
@icchy
icchy / solve_10000.py
Created October 3, 2016 07:39
SECCON 大阪大会 2016 backdoor(easy)
from pwn import *
import hashlib
import commands
import re
def submit(flag):
import commands
import random