Unleash the Beast!

CTFなどのメモに使います

2019-05-01から1ヶ月間の記事一覧

CTF 313 2019 WriteUps(2)

It is a continuation of this article. https://imurasheen.hatenablog.com/entry/2019/05/23/000259 Hash [MD5] - 2pts [Rivest Head] - 2pts [NTLM] - 3pt [MD2] - 3pts Potpourri [Brillig] - 3pts [SPQR] - 3pts [No Secrecy Afforded] - 3pts [Swaying…

CTF 313 2019 WriteUps(1)

I solved 21 issues at this competition, but I got only 91 points. Each issues had low score... Encryption&Encoding [Not Encryption] - 3pts [Adapt] - 3pts [Lucky Number] - 3pts [Phonemes] - 3pts [BOTW] - 3pts [A Long-Expected Party] - 3pts …

ALL.MN CTF 2019 - Archive

https://archive.org/web/Search "http://saturn.mn" at WaybackMachine, I got the archive of this site. And I found the archive which saved at February 21st , 2015. I found 3 archives on this day(15:27:16, 17:11:06, 18:42:42). I refered the m…

ALL.MN CTF 2019 - Robots

Our team got 8th place of this competition. We were annoyed by the slowness of the response of the server... According to the title of the issue, I guess it relates to robots.txt.I accessed http://chall.all.mn/robot/robots.txt, then I got …

CSA CTF 2019 - Kimi No Na Wa

The attached file is pcap file, and it is the packets of any suspicious communication. I focused about , there are lots of DNS queries. So I suspected DNS tunneling. By using wireshark, filter the packets by this criteria : dns && ip.dst==…

CSA CTF 2019 - Monkey

Our team solved all issues of this competition, and we got 3rd place!! The attached file is pcap file. It seems USB capture data. So I processed the capture data by the following procedure. (1)Open the pcap file by Wireshark, and filtered …

Blaze CTF 2019 - 0day sanity

After I connect to the server, it requires base64-encoded data. So I send "Bz==" to observe the behavior. The result is following. ****************root@kali:~# nc chal.420blaze.in 42004Give me a file (base64 encoded, followed by a newline)…