picoCTF 2022: forensics – Torrent Analyze

Ulli Weichert/ April 5, 2022/ IT-Security, Write-Ups/ 0Kommentare

Torrent Analyze Description SOS, someone is torrenting on our network. One of your colleagues has been using torrent to download some files on the company’s network. Can you identify the file(s) that were downloaded? The file name will be the flag, like picoCTF{filename}. Captured traffic. Solving Loading the pcap file into wireshark and started looking at it. At the beginning

Weiterlesen

picoCTF 2022: forensics – St3g0

Ulli Weichert/ April 5, 2022/ IT-Security, Write-Ups/ 0Kommentare

St3g0 Description Download this image and find the flag. Download image Solving Looking at the hint We know the end sequence of the message will be $t3g0. Okay, I did some google research with that $t3g0 and found an interessting article. Downloaded the script from the github repo run it with the image FLAG 🙂 #import libraries import sys import

Weiterlesen

picoCTF 2022: binary-exploitation – bufferoverflow1

Ulli Weichert/ April 5, 2022/ IT-Security, Write-Ups/ 0Kommentare

buffer overflow 1 Description Control the return address Now we’re cooking! You can overflow the buffer and return to the flag function in the program. You can view source here. And connect with it using nc saturn.picoctf.net 51721 Info The links could be different.. the instance will be different (you have to launch your own in CTF) Solving This is

Weiterlesen

picoCTF 2022: binary-exploitation –bufferoverflow0

Ulli Weichert/ April 5, 2022/ IT-Security, Write-Ups/ 0Kommentare

buffer overflow 0 Description Smash the stack Let’s start off simple, can you overflow the correct buffer? The program is available here. You can view source here. And connect with it using: nc saturn.picoctf.net 65445 Solving Download the sourcecode and the program If we check the sourcecode we will see, that a sigsev will give us a flag Playing with

Weiterlesen