Browsing Category

Wargame

score
CTF, Wargame,

S21SEC [DCS17CTF] – Namibia

Hi mates, During my spare time i have tried some tasks from DSC17 CTF by S21sec. I will comment here on those in which I found more difficult or fun. FBCTF was present as platform so from here tasks names will be countries associated. Namibia – 450 points  SREC Motorola Firmware

score
CTF, Wargame,

S21SEC [DCS17CTF] – Ucrania

Hi mates, During my spare time i have tried some tasks from DSC17 CTF by S21sec. I will comment here on those in which I found more difficult or fun. FBCTF was present as platform so from here tasks names will be countries associated. Ucrania – 450 points  Initial analisis Some

score
CTF, Wargame,

S21SEC [DCS17CTF] – Finlandia

Hi mates, During my spare time i have tried some tasks from DSC17 CTF by S21sec. I will comment here on those in which I found more difficult or fun. FBCTF was present as platform so from here tasks names will be countries associated. Finlandia – 400 points  I have an Excel

score
CTF, Wargame,

S21SEC [DCS17CTF] – Mauritania

Hi mates, During my spare time i have tried some tasks from DSC17 CTF by S21sec. I will comment here on those in which I found more difficult or fun. FBCTF was present as platform so from here tasks names will be countries associated. Mauritania – 400 points  First Run  Before

score
CTF, Wargame,

S21SEC [DCS17CTF] – Somalia

Hi mates, During my spare time i have tried some tasks from DSC17 CTF by S21sec. I will comment here on those in which I found more difficult or fun. FBCTF was present as platform so from here tasks names will be countries associated. Somalia – 800 points    They provide

score
CTF, Wargame,

S21SEC [DCS17CTF] – Venezuela

Hi mates, During my spare time i have tried some tasks from DSC17 CTF by S21sec. I will comment here on those in which I found more difficult or fun. FBCTF was present as platform so from here tasks names will be countries associated. Venezuela – 400 points This time we

ihacklabs
CTF, labs, Wargame,

IHackLabs, aprende de los mejores

Introducción Recientemente he probado “IHackLabs”, una plataforma de aprendizaje, laboratorios y certificaciones para estudiantes y profesionales. Me he reunido con Diana y Carlos, la gente detrás de esta idea, en “Sh3llCON2017 Congreso de Seguridad”. Todo el trabajo en torno a los laboratorios están destinados a reproducir los ejercicios del mundo

CTF, Wargame,

Ghost in the Shellcode 2014: Write-up CTF247

This weekend we have 46 hours of hard ctf. Organization let tou play a ‘doom-style’ game that could be decompiled and must be pwned to achieve some missions. This task is one of two web challenges, a parody of CTF365 (lol).Going to ctf247.2014.ghostintheshellcode.com. was pretty simple since we notice there was

final
CTF, Wargame, XSS,

XSS Challenges

Here’s my journal to solve all the XSS Challenges writed  by yamagata21 on http://xss-quiz.int21h.jp/, This is an starter level to people who want to learn some cross-site scripting and its several ways to inject on differents browsers. XSS Challenges http://xss-quiz.int21h.jp Stage1: http://xss-quiz.int21h.jp Solution: <script>alert(document.domain);</script> Stage2: http://xss-quiz.int21h.jp/stage2.php?sid=e93e71eed43c3ab5668af6a5aa603cf66eedce70 Solution: “><script>alert( alert(document.domain))</script> Stage3: http://xss-quiz.int21h.jp/stage-3.php?sid=d362dd49b96c30f3e9a4a6ea0abafb0cef59ed2d Solution: The input in text box

CTF, Wargame,

NotSoSecure SQLi CTF – writeup

Access to challenge using a proxy like burp or zap and submit data to login. Notice the forwarded to: http://ctf.notsosecure.com/71367217217126217712/checklogin.php that contains: 7365637265745f72656769737465722e68746d6c This could be decoded ‘7365637265745f72656769737465722e68746d6c’.decode(‘hex’) in python to read secret_register.html >>> '7365637265745f72656769737465722e68746d6c'.decode('hex') 'secret_register.html' The registration page offers four fields that, when you register, create some session_id encoded

CTF, Wargame,

ASIS CTF – simple pcap “spcap” writeup

A simple task named spcap (simple pcap). We open it with wireshark and get the Statistics->Conversations. Some SSH, HTTP on it. Apply this filter on HTTP: ip.addr==172.16.133.133 && tcp.port==52694 && ip.addr==172.16.133.149 && tcp.port==80 We notice that if we follow TCP stream there’s a GET request file called “/files/flag.jpg”, so we

LittleSnapper
CTF, Wargame,

29C3 CTF: Node writeup

This 29C3 from Chaos Computer Club hackers. We participate as dcua team, awesome people trying the best effort for the challenges.  Nice job! Node Points: 200 Solves: 18 Description Node.js is smart, fast, easy and secure… Don’t you think so too? Hint: google and other sites always look at one file before

zombusiness
CTF, Wargame,

CTF Hack.lu: Mini Zombie Business (+100pt) write-up

We got to make some business with our zombie in https://ctf.fluxfingers.net:2076/mini/. There’s a zombie image and at first look we get some data encoded on it. <form/name="a"/data-a="Fcabdux ehiktgmaj:nopylqrsvf_wz(&quot;){}.?L="></form> <div/id="&#x61;"></div>//id="a" <img/src="zomb.png"/onclick="dafuq()"/> There is a <script> tag with several unescape functions and after convert it from url-encode and unicode text we get:

Wargame,

OWASP 2012 Online Competition

Para los que queráis ‘hackear’ en un entorno seguro y legal, Hacking-Lab ha promovido a través de su patrocinador OWASP un nuevo wargame con la posibilidad de ganar algún premio, como la asistencia a las AppSec USA y AppSEC Latam 2012. Personalmente me gustan este tipo de ‘challenges’, ya que despiertan en

Wargame,

II Wargame SecurityByDefault (“feellikecsi series”)

Dentro de la competición había una serie de pruebas de análisis forense. Los organizadores te proporcionan un fichero imagen y  debes indicar una serie de datos que te piden, a saber: feellikecsi_rls: Release name y version del sistema afectado. feellikecsi_knl: Version del kernel. feellikecsi_cve: Referencia al documento CVE. feellikecsi_iph: Dirección

Wargame,

II Wargame SecurityByDefault (“keyconsole”)

En primer lugar gracias a las personas detrás de SbD por organizar este concurso y enhorabuena a los ganadores, esperamos sus write-ups ansiosos. Este reto consistía en conocer el token al ejecutar el fichero que proporcionaba la prueba ‘keyconsole’. Al ejecutarlo mostraba el siguiente mensaje: Decido abrir el binario con

Wargame,

II Wargame SecurityByDefault (“errorz”)

En el reto se nos muestra una imagen donde hay una calavera pirata que nos sugiere que puede haber algún error en la imagen. Después de pasar por varias herramientas de extracción de metadatos exif y conocer todo tipo de detalles sobre la creación de la imagen hago una búsqueda