Skip to content

Instantly share code, notes, and snippets.

View vic511's full-sized avatar

vic vic511

View GitHub Profile
@vic511
vic511 / Readme.md
Last active May 3, 2021 16:08
FCSC 2021 quals - Reporter pwn challenge

Reporter writeup

We are facing an ELF 64-bit binary.

$ checksec fcsc_browser
    Arch:     amd64-64-little
    RELRO:    Partial RELRO
    Stack:    No canary found
 NX: NX disabled
@vic511
vic511 / Readme.md
Last active May 3, 2021 16:07
FCSC 2021 quals - VMV reverse challenge

VMV writeup

Architecture

We are facing a stripped ELF 64-bit binary. It accepts a command-line parameter most likely being the password being checked. We notice the binary is taking a lot of time to execute before noticing us of a fail.

As the name suggests, we are going to consider the binary is actually an

Challenge accepted

Context

This is the solution for the coding challenge Challenge accepted from Sogeti CTF qualifications 2019.

Explanation

The python code of a server is given.

@vic511
vic511 / Readme.md
Last active February 25, 2019 00:14
Solving script for the NotBad.exe web challenge from Sogeti CTF quals 2019

NotBad.exe

Context

This is the code used to solve the NotBad.exe web challenge from Sogeti CTF qualifications 2019.

Explanation

There is a second order SQL injection in username, while retreiving current user's notes. The python script is a REPL shell you can script to test your payloads.

class Labyrinth:
MSG_WALL = 'STOMP ! You hit a wall, you stay at your last position'
MSG_OK = 'OK - your new position is'
DIRECTIONS = {
'N' : (0, 1),
'S' : (0, -1),
'W' : (-1, 0),
'E' : (1, 0)
}
INVERTED = {
#!/usr/bin/env python
# coding: utf-8
from pwn import *
class Exploit:
def __init__(self, args):
if len(args) == 1:
self._func = process
else:
@vic511
vic511 / Makefile
Last active August 29, 2017 19:49
Dynamic reloading PoC
CC = gcc
CFLAGS = -Wall -Wextra -std=gnu99
LDFLAGS = -ldl
RM = rm -f
poc: poc.o first.so second.so