bi0s
  •  Home
  •  Categories
  •  Archives
  •  Tags
  •  Home
  •  Categories
  •  Archives
  •  Tags

Batman Investigation I - Like Father Like Son - bi0sCTF 2024

Azr43lKn1ght
2024-03-05
Forensics

Full solution of Batman Investigation II - Gotham Underground Corruption from bi0sctf 2024

tl;dr

  • Challenge 1 of Batman Investigation series
  • Memory Forensics - WinDBG Dump Debugging - Malware Analysis - Incident Response - Threat Hunting
Read More
bi0sCTF Memory Forensics Incident Response Malware Analysis WinDBG Dump Debugging Threat Hunting

baeBPF - bi0sCTF 2024

Chee-tzu
2024-03-03
RE

tl;dr

  • Analysis of eBPF assembly
  • Simple optimization
Read More
bi0sCTF eBPF

t0y-b0x - bi0sCTF 2024

the.m3chanic
Sans
2024-03-03
RE, Crypto

tl;dr

  • Binary obfuscation with hidden anti-debug checks
  • Linear Cryptanalysis (AES with linearly dependent SBOX)
Read More
bi0sCTF Anti-debug AES

beehive - bi0sCTF 2024

the.m3chanic
2024-03-02
RE

tl;dr

  • Custom hook to syscall 0x31337 using eBPF
  • Check on the argument passed to syscall to verify correct/incorrect key
Read More
bi0sCTF eBPF

കുട്ടി Notes - bi0sCTF 2024

Lu513n
2024-02-29
Web

tl;dr

  • DOM Clobbering to Redirect to another page
  • Increasing Content using SQL Injection giving the same column multiple times
  • Connection-Pool XS-Leaks to measure the time for the page to load
  • Leak the flag character by character using the above techniques
Read More
bi0sCTF DOM Clobbering XS-Leaks

kowaiiVm - bi0sCTF 2024

k1R4
2024-02-28
Pwn

tl;dr

  • The VM takes a custom binary as input
  • Binary contains function table, code and bss sections
  • Code can overlap with bss and be modified at runtime
  • The JIT compiler assumes that a function is safe since it ran many times
  • Functions modified right before JIT bypass security checks
Read More
bi0sCTF Exploitation VM JIT

virtio-note - bi0sCTF 2024

k1R4
2024-02-28
Pwn

tl;dr

  • The patch adds a vulnerable virtio device
  • The device accesses pointers without bound check
  • Abuse OOB pointer access to setup arb r/w primitive
  • Craft open,read,write ropchain on heap
  • Overwrite virtqueue handler with stack pivoting gadget
Read More
bi0sCTF Exploitation QEMU VM-Escape

palindromatic - bi0sCTF 2024

k1R4
2024-02-26
Pwn

tl;dr

  • Sanitizing request causes null byte overflow which corrupts type
  • Processing corrupted request doesn’t remove it from incoming_queue
  • Reaping corrupted request still leaves it in incoming_queue causing UAF
  • Setup crosscache to abuse UAF
  • UAF provides free primitive through double reset
Read More
Heap bi0sCTF Exploitation Kernel

Variety Notes - bi0sCTF 2024

Luc1f3r,Lu513n
2024-02-26
Web

tl;dr

  • Capturing the flag id through redos attack in /search endpoint
  • XSS in /uuid/noteid/raw and HTML injection in /uuid/noteid
  • CSP frame-src bypass through server side redirect
Read More
bi0sCTF ReDos CSP bypass

BlueLock - bi0sCTF22

AmunRha
2023-02-10
Reversing / Windows

tl;dr

  • Implemented two SEH and two VEH Exception Handlers
  • Two stage malware challenge with process injection technique
  • CPP binary where logic is wrapped in classes and their member functions
Read More
bi0sCTF Windows Reversing ExceptionHandling

1 / 2

 Next 

Official blog of team bi0s

  Projects
  •   bi0s-wargame
    (Unraveling)
  •   bi0s-wiki
    (Free Encyclopedia)
  •   InCTF
    (Nationals CTF)
  •   InCTFj
    (Juniors CTF)

Made With Love and Coffee



Blog content follows the Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License

Use Material X as theme, total visits times.