Skip to content

Instantly share code, notes, and snippets.

__text:00000A80 ; ===========================================================================
__text:00000A80
__text:00000A80 ; Segment type: Pure code
__text:00000A80 AREA __text, CODE, READWRITE
__text:00000A80 ; ORG 0xA80
__text:00000A80 CODE16
__text:00000A80
__text:00000A80 ; =============== S U B R O U T I N E =======================================
__text:00000A80
__text:00000A80
0000000: 574f 4c4f 0100 0000 0400 0400 0555 5345 WOLO.........USE
0000010: 524e 414d 4500 0000 0000 0000 0006 5041 RNAME.........PA
0000020: 5353 574f 5244 0000 0000 0000 0000 0041 SSWORD.........A
0000030: 444d 494e 0000 0000 0000 0000 0000 0000 DMIN............
0000040: 4953 4157 4553 4f4d 4500 0000 0000 0000 ISAWESOME.......
0000050: 6361 7074 6169 6e66 616c 636f 6e00 0000 captainfalcon...
0000060: 6663 3033 3332 3935 3035 3437 3564 6434 fc03329505475dd4
0000070: 6265 3531 3632 3763 6337 6630 6231 6631 be51627cc7f0b1f1
0000080: 0101 6361 7074 6169 6e66 616c 636f 6e00 ..captainfalcon.
0000090: 0000 6663 3033 3332 3935 3035 3437 3564 ..fc03329505475d
@volpino
volpino / gist:6457e7e1520e6800be62
Created September 22, 2014 21:20
csaw 2014 - ish exploit
Username:
Is Shell v1.0 (Codename: Iz gud)
ish$ login
Username:
Is Shell v1.0 (Codename: Iz gud)
ish$ login
Username:
Is Shell v1.0 (Codename: Iz gud)
ish$ login
Username:

Keybase proof

I hereby claim:

  • I am volpino on github.
  • I am volpino (https://keybase.io/volpino) on keybase.
  • I have a public key whose fingerprint is B696 B93C 4836 29EF 7199 0A0B 0FAB 75F3 A018 BEF6

To claim this, I am signing this object:

package io.asis.ctf2014.numdriod.tools;
import android.util.*;
public class DebugTools
{
public static boolean DBG;
public static String DBG_TAG;
static {
@volpino
volpino / sat.py
Created October 13, 2014 09:40
sattelite - ASIS CTF Finals 2014
import socket
import pycosat
def clean(s):
s = s.replace('(', '')
s = s.replace(')', '')
s = s.replace('x', '')
s = s.replace('\xc2\xac', '-')
s = s.replace('\xe2\x88\xa8', '')
return map(int, s.split())
import socket
s = socket.socket()
s.connect(("asis-ctf.ir", 12445))
s.recv(2048)
s.send("Paillier\n")
s.recv(2048)
lo = 10 ** 307
@volpino
volpino / crsh.py
Created October 13, 2014 17:39
A familiar system - ASIS CTF Finals 2014
#!/usr/bin/python
#flag = # censored
from gmpy import next_prime, invert, is_prime, mpz
from random import randint
from hashlib import sha1
def makey():
q = next_prime(randint(1, 2**1024))
@volpino
volpino / douchemac.py
Created October 23, 2014 11:06
hack.lu 2014 - douchemac exploit
import dbus
def xor(s1, s2):
return "".join([chr(ord(s1[i]) ^ ord(s2[i])) for i in range(len(s1))])
bus = dbus.bus.BusConnection("tcp:host=wildwildweb.fluxfingers.net,port=1420")
p = bus.get_object('test.test123.Server', '/Server')
server_iface = dbus.Interface(
p,
dbus_interface='test.test123.Server'
@volpino
volpino / protocol
Created October 23, 2014 19:06
protocol description - peace pipe - hack.lu CTF 2014
====================
+Description of Truth+
====================
Wahkoowah Makawee
* choose random r_w out of Q choose random r_m out of Q *
* Compute Compute *