Spellbook - HackTheBox University
Write-Up of Spellbook from HackTheBox University CTF. This is a heap challenge on libc 2.23 involving fastbins.…
Write-Up of Spellbook from HackTheBox University CTF. This is a heap challenge on libc 2.23 involving fastbins.…
Introduction The Root-Me CTF took place on october 21st-23th. At this occasion I released a challenge named UPX2000. Here is its writeup. Reverse Engineering of the binary This write up will be divided in two steps. First the reverse engineering of the binary and then the solving of the challenge.…
Initial Statement The goal of this challenge is simple. Gain an access over the server using a vulnerability in the software. Although this is a quite typical exploitation, there was only two solves on this challenge. Analysis First thing to do with this kind of challenge is execute the file…
Starting Point
Initial Statement
Donnez votre nom au binaire et voyez ce que vous pouvez en tirer !
nc ctf.woody.sh 2000
Hint: CRIE FORT
Code:
#include
Simple - 50 points Introduction This challenge was the first pwn challenge of the CTF. Statement: Récupérez le contenu du fichier flag.txt situé sur le serveur simple.interiut.ctf en ssh avec l'utilisateur chall et le mot de passe chall. Get the content of the flag.txt file on…