Description
I tried to download the flag, but somehow received only 404 errors 🙁
Hint: The last step is to look for flag pattern.
Continue reading [Internetwache CTF 2016] [Misc 80 – 404 Flag not found] Write Up
I tried to download the flag, but somehow received only 404 errors 🙁
Hint: The last step is to look for flag pattern.
Continue reading [Internetwache CTF 2016] [Misc 80 – 404 Flag not found] Write Up
Sniffing traffic is fun. I saw a wired shark. Isn’t that strange?
Continue reading [Internetwache CTF 2016] [Misc 70 – Rock with the wired shark!] Write Up
Can you read the barcodes?
Continue reading [Internetwache CTF 2016] [Misc 90 – BarParty] Write Up
We have hidden a message in png file using jar file. Flag is hidden message. Flag is in this format:
SharifCTF{flag}
We have an archive containing:
– png image
– a jar
Continue reading [Sharif University CTF 2016] [Misc 50 – Asian Cheetah] Write Up
You should fix vulnerabilities of the given source code, WITHOUT changing its normal behaviour.
Rules & Notes
MISSION: You should fix vulnerabilities of the given source code, WITHOUT changing its normal behaviour.
RULE0: When an honest user gives a non-malicious (but maybe incorrect) input which does not trigger the vulnerabilities,
the output of uploaded fixed code should be the same as before.
RULE1: When the attacker gives his/her attack vector, your program should not crash or do dangerous actions (explained below),
but continue its execution and exit normally at the end. In this situation, your program is allowed to output anything.
RULE2: A (poorly-tested) source code may crash even when interacting with a normal user. You should fix these cases too.
(NOTE: the output should be correct in this case)
Dangerous actions (stated above) includes buffer overflows, writing to unallocated memory address, reading uninitialized memory,
and any other programming mistakes leading to crash/instability.
Some prevention techniques, detect the attack and prevent memory corruption but throw an exception which terminates the program,
leading to denial of service. You should avoid such termination and the program should recover from the attack, continue execution,
and exit normally at the end.
Continue reading [Sharif University CTF 2016] [Misc 300 – Sec-Coding 2] Write Up