bi0s
  •  Home
  •  Categories
  •  Archives
  •  Tags
  •  Home
  •  Categories
  •  Archives
  •  Tags

Signal VM (Part 1) - de1CTF 2019

R3x
2019-08-08
Reversing / Linux

tl;dr

  • Challenge is a VM implemented over signals and ptrace
  • Reverse Instruction types and implementation
  • Use gdb scripting to find the executed code and get the pseudo VM code
  • Reverse the VM functionality (Hill cipher) for flag and profit
Read More
Linux VM Reversing Automation

FakeTCP - CyBRICS Quals 2019

f4lc0n
2019-07-25
Forensics / Network

tl;dr

  1. Open a raw socket.
  2. Craft the outgoing packets with the byte order of S-PORT, D-PORT, SEQ, ACK reversed.
  3. Establish the three way handshake in this fashion.
  4. Send “GET_FLAG” to the server.
Read More
CustomTCP

Easy Husky - ISITDTU Quals 2019

stuxn3t
2019-07-08
Forensics / Memory

tl;dr - Volatility + Corrupted file analysis
Full solution of Easy Husky challenge from ISITDTU Quals 2019.

Read More
Windows Memory Analysis

Acronym - ISITDTU Quals 2019

stuxn3t
2019-07-08
Forensics / Steganography

Full solution of Acronym challenge from ISITDTU Quals 2019.
tl;dr - Steganography

Read More
Steganography

MicroServiceDaemonOS - GoogleCTF Quals 2019

sherl0ck
2019-07-01
Pwn

tl;dr

Out of bounds write in trustlet ‘1’, allows us to write random bytes at an address of
our choice. We can write our shellcode to an rwx region with this, without any bruteforce.

Note: During the CTF we used a 1 byte brute-force to get write shellcode in the rwx segment and get shell. It was only afterwards that we realised that no bruteforce was required!

Read More
GoogleCTF OOB

Copychall - Acebear CTF 2019

R3x
2019-04-25
Reversing / Linux

tl;dr

  • You need to pass 999 levels to get the flag.
  • Each of the levels involves multiple checks on input characters.
  • Each check happens in seperate functions which are decrypted during runtime.
  • Extract function order and arguments.
  • Automate finding input for each check.
Read More
Linux Reversing

Halloween Party - ASIS CTF Quals 2019

s0rc3r3r
2019-04-23
Crypto / Elliptic-Curves

tl;dr

  1. Find Elliptic Curve parameters from given points on the curve
  2. Find x-coordinate of 2*P, given y-coordinate of 2*P
  3. Invert 2 over mod (P.order()) and multiply the result with 2*P to get P
  4. Submit ASIS{P.x} as the flag
Read More

EZDSA - MidnightSun CTF Quals 2019

s0rc3r3r
2019-04-09
Crypto / Digital-Signatures

Full solution of EZDSA challenge from MidnightSun CTF Quals 2019.

tl;dr retrieving key using Euler’s Criterion to break signature authentication

Read More
Euler NumberTheory PublicKeyCrypto

Blind - Volga CTF Qualifiers 2019

s0rc3r3r
2019-03-31
Crypto / Digital-Signatures

tl;dr solving RSA Digital Signature using it’s homomorphic property:

  1. Calculate the signature of factors of message M to be signed, separately
  2. Combine them by multiplication over modulus to get the signature of M
Read More

Reasonably Suspicious Acronym - Teaser CONFidence 2019

s0rc3r3r
2019-03-18
Crypto / PubKey-Enc

tl;dr Coppersmith’s Attack to recover RSA primes

Read More
RSA Coppersmith

 Previous 

17 / 18

 Next 

Official blog of team bi0s

  Projects
  •   bi0s-wargame
    (Unraveling)
  •   bi0s-wiki
    (Free Encyclopedia)
  •   InCTF
    (Nationals CTF)
  •   InCTFj
    (Juniors CTF)

Made With Love and Coffee



Blog content follows the Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

Use Material X as theme, total visits times.