's Picture

Thomas

  • Home
  • About
  • Posts
  • Search

#ctf

A collection of 13 posts

November 19, 2018

Flare-on 2018 #8: doogie.bin

This challenge came only with a .bin-file, and a quick ‘file’ told me this was going to be fun:

ctf flareon5

October 18, 2018

Flare-on 2018 #4: binstall.exe

The first interesting challenge of 2018 was a simple executable. Initial examination shows it’s a .NET executable, so I turn to dnSpy to get some more information.

ctf flareon5

October 17, 2017

Flare-on 2017 #10: shell.php

shell.php looked like a webshell you’d find left behind by an attacker. See the bottom of this post for the full challenge code.

ctf flareon4

October 17, 2017

Flare-on 2017 #9: remorse.ino.hex

The filename ends with ‘ino.hex’, which hints towards an Arduino binary; which uses an AVR microcontroller. A strin gin the binary hints towards an Arduino UNO, which has an ATmega328P microcontroller, specifically. I know quite a bit of AVR assembly,...

ctf flareon4

October 17, 2017

Flare-on 2017 #8: flair.apk

This is an Android APK, so first up, we need to decode it. Since an APK is just a zip, we could just unzip it, but that leaves quite a few encoded files inside; so using Apktool is a better...

ctf flareon4

Page 1 of 3 Older Posts

Thomas © 2024. Royce theme by JustGoodThemes.
Powered by Jekyll.

Back to top