Author: d1g174l_f0rtr355
Solves: 10
Difficulty: Medium
Author: d1g174l_f0rtr355
Solves: 10
Difficulty: Medium
This is one of the hack the box challenges that I was solving the other day, and have noticed that such concepts appear quite frequently in many ctf's. I would like to take you through the entire challenge and hopefully you will be able to understand the underlying concept!
First off, as usual we do a preliminary check on the binary given to us!
Canary : ✓
NX : ✓
This was one of the good challenges that I tried during the CTF. It was based on a technique called SROP (Sigreturn Oriented Programming).
The purpose of this challenge was to defeat ASLR and so the binary as such consisted of only two functions - main
and _start
both written in simple assembly making use of syscalls.
I'll take you through challenge and how I solved it!
Challenge Points: 400
Challenge Author: d1g174l_f0r7r355
A hard challenge I made for InCTF Nationals Finals round. The protections given on the binary were full, and there was no possibility for leaks. It is based on the concept of making use of a vsyscall to jump to backdoor. Before I proceed, I would just like to state that this challenge does not require any sort of brute approach.
Challenge Points: 200
Challenge Author: d1g174l_f0r7r355
This challenge was ret2win (with arguments) + dynamic rop. Some may have used tools like angr and z3 for a few of the win() functions in order to guess the arguments, however in my writeup, I have used neither.
Challenge Points: 200
No of Solves:
Challenge Author: d1g174l_f0r7r355
This challenge was a shellcode based challenge, with a few bad characters in check.
Challenge Points: 400
No of Solves: 4
Challenge Author: d1g174l_f0r7r355
This was one of the hard challenges I made for inctfj qualifiers. It is based on format strings. I will try to explain all the concepts required and used in this challenge.
Challenge Points: 200
No of Solves: 6
Challenge Author: d1g174l_f0r7r355
This was one of the medium challenges I made for inctfj qualifiers. It is based on ret2shellcode.
Challenge Points: 488
No of Solves: 17
Challenge Author: d1g174l_f0r7r355
Challenge file: chall