Skip to content

Commit c684925

Browse files
committed
pwn Challenge Message and Hints
1 parent b360059 commit c684925

File tree

7 files changed

+64
-3
lines changed

7 files changed

+64
-3
lines changed

pwn/64archInts/README.md

+9-1
Original file line numberDiff line numberDiff line change
@@ -5,4 +5,12 @@
55
* Decompile or Disassemble Executable and compare with the correct hexadecimal address
66

77
## Quick Solution
8-
* `printf "252994\n" | ./int`
8+
* `printf "252994\n" | ./int`
9+
10+
---
11+
12+
## Challenge Message
13+
For some reason, you’re being asked to help a 64-year-old beekeeper. He’s having trouble with extracting the honey from the hexagonal honeycombs; why don’t you try examining the architecture of the beehive to see if you can obtain something?
14+
15+
## Challenge Hints
16+
* Continue until you find the correct path.

pwn/exec/README.md

+10-1
Original file line numberDiff line numberDiff line change
@@ -8,4 +8,13 @@
88
* The `rand-obfusc.py` is needed to make sure that the utility `strings` won't break this challenge (and somewhat makes it more difficult)
99
* Run for some C Code generation
1010

11-
`jctf{ran_an_ELF_Ex3cutable}`
11+
`jctf{ran_an_ELF_Ex3cutable}`
12+
13+
---
14+
15+
## Challenge Message
16+
Your superhero coworker is asking for your assistance with rescuing a 64-year-old elderly woman’s pet cat from an executable file that won’t open. (Apparently the fire department only helps with cats stuck in trees.) Save the cat by finding a way to run the executable file!
17+
18+
## Challenge Hints
19+
* Do it the easy way for less pain
20+
* Executables depend on a lot of things: architecture, OS, language, and libraries.

pwn/intro-pwn/README.md

+12
Original file line numberDiff line numberDiff line change
@@ -7,3 +7,15 @@ You need to open port to receive connection
77

88
## Solution
99
nc `IP` -> flag
10+
11+
---
12+
13+
# ***NOT OFFERED IN JCTF2021***
14+
15+
---
16+
17+
## Challenge Message
18+
Alert! One of your superhero coworkers is trying to communicate with you to ask for your assistance with a mission. Unfortunately, the villains have meddled with your communication system. You must find a way to connect to the server directly...
19+
20+
## Challenge Hints
21+
* There is something about connecting and a cats

pwn/revPop/README.md

+9-1
Original file line numberDiff line numberDiff line change
@@ -6,4 +6,12 @@
66
## Solution
77
* Various
88
* My person favorite is using the hexeditor and disable the ASCII part
9-
* lol jk, just use `strings`
9+
* lol jk, just use `strings`
10+
11+
---
12+
13+
## Challenge Message
14+
On one of your missions, it seems your foes fumbled while backpedaling and accidentally dropped a secret program. You wonder if you can discover something about their plans by looking through this program… what if something is hiding in plain sight?
15+
16+
## Challenge Hints
17+
* Maybe doing some other static analysis would help?

pwn/sim-worker/README.md

+7
Original file line numberDiff line numberDiff line change
@@ -4,3 +4,10 @@
44
## Solution
55
* Subtract Maximum Value of Object to value needed
66

7+
---
8+
9+
## Challenge Message
10+
It’s said that money is the root of all evil. Buffer Buffoon is back for attack #3, but now he’s a bitcoin banker! You long to defeat him once more…
11+
12+
## Challenge Hints
13+
* What still befuddles me is that there are so many TYPES of Vulnerabilities!

pwn/simple_buffo1/README.md

+9
Original file line numberDiff line numberDiff line change
@@ -1 +1,10 @@
11
# simple_buffo1
2+
3+
---
4+
5+
## Challenge Message
6+
Oh no! The supervillain Buffer Buffon is causing mayhem— find a way to thwart his mischief and restore peace to the stack!
7+
8+
## Challenge Hints
9+
* Without stack canaries, you can go pretty far!
10+
* A really simple buffer overflow.

pwn/simple_buffo2/README.md

+8
Original file line numberDiff line numberDiff line change
@@ -1 +1,9 @@
11
# simple_buffo2
2+
3+
---
4+
5+
## Challenge Message
6+
Buffer Buffoon is back again with new blunders. Will you be able to defeat him again? This time, numerous things have to be precisely correct to get this moving along!
7+
8+
## Challenge Hints
9+
User input and cmd argument are called in different ways...

0 commit comments

Comments
 (0)