tl;dr
- Challenge is a VM implemented over signals and ptrace
- Reverse Instruction types and implementation
- Use gdb scripting to find the executed code and get the pseudo VM code
- Reverse the VM functionality (Hill cipher) for flag and profit
tl;dr
tl;dr
tl;dr - Volatility + Corrupted file analysis
Full solution of Easy Husky challenge from ISITDTU Quals 2019.
Full solution of Acronym challenge from ISITDTU Quals 2019.
tl;dr - Steganography
Out of bounds write in trustlet ‘1’, allows us to write random bytes at an address of
our choice. We can write our shellcode to an rwx region with this, without any bruteforce.
Note: During the CTF we used a 1 byte brute-force to get write shellcode in the rwx segment and get shell. It was only afterwards that we realised that no bruteforce was required!
tl;dr
tl;dr
Full solution of EZDSA challenge from MidnightSun CTF Quals 2019.
tl;dr retrieving key using Euler’s Criterion to break signature authentication
tl;dr solving RSA Digital Signature using it’s homomorphic property:
M
to be signed, separatelyM
tl;dr Coppersmith’s Attack to recover RSA primes