-->
Base Ctfs 2016

Base Ctfs 2016

Base Ctfs 2016

Base CTF 2016 Pwn Challenges as well as Writeup ( Part V )

Pwn06: Try Harder!

Solution:

let start out alongside debugger.

Damn, he wanted “BABE” ! ;)
So, allow notice the crash signal as well as combine into lastly payload.

  Done ! :)

Enjoy guys !
Ye Yint Min Thu Htut

Base CTF 2016 Pwn Challenges as well as Writeup ( Part IV )

Pwn05: Talk about other i !

Solution:

It is uncomplicated buffer overflow challenge. You accept to notice crash signal as well as portion address to impress flag.

Let practice designing to notice crash signal every bit smart way.
Save every bit pwn.
Run alongside the debugger as well as charge the payload to larn offset.
 Then, allow explore the suspected function.

 Got it at 0x0804846b !
 Let practice lastly payload to larn flag.
 Pwned ! :)

Enjoy guys !
Ye Yint Min Thu Htut

Base CTF 2016 Pwn Challenges as well as Writeup ( Part III )

Pwn04: Bypass me !

Solution:

For this challenge, y'all accept to bypass ARP filtering to larn grant.
Let seek for authorized MAC address.
Found 00:0C:29:04:a1:a , y'all tin fuzz [0 to F] to larn lastly char as well as supervene upon alongside your existing MAC address.  
Easy ? :)
Cheers !
Ye Yint Min Thu Htut

Base CTF 2016 Pwn Challenges as well as Writeup ( Part II )

Pwn03: Dun forgot your environment!

Solution:

“System is calling date” is hint for that challenge. It is every bit good regulation privilege escalation challenge.
Let practice our ain “Date” to larn grant.

Pwned ! :)
Cheers ! 
Ye Yint Min Thu Htut

Base CTF 2016 Pwn Challenges as well as Writeup ( Part I )



For Base CTF 2016 (Myanmar Cyber Security Competition), our substance squad fellow member “Ye Yint Min Thu Htut” facilitated inward making about challenges. Our challenges are primarily aimed for entry marker participants of CTF to smooth their CTF knowledge. We volition deliver to a greater extent than hardcore challenges inward coming CTFs i time y'all ready :).
Congrats to all solvers of our challenges.
Ok, allow outset the writeup for your ref.

Pwn02: Find me!

Solution:




Yea, it was inspecting your UID for grant.
You needed to notice right UID or bypass it. We volition utilisation bypass method.
Run it inward debugger.

Damn, checkpoint is there.


Let laid a breakpoint, as well as alter EAX value to decease UID 1256 ( 0x4e8 ).



 Granted ! :)

Enjoy guys !
Ye Yint Min Thu Htut


Blogger
Disqus
Pilih Sistem Komentar

No comments

Advertiser