Insomnihack 2016 microwave writeup

I participated to the 2016 Insomni'hack CTF with my team Fourchette Bombe. It was a really cool CTF with lots of cool challenges. We finished on 8th place this year. So here is my writeup for one of the pwnable challenges I solved. We are given a x86_64 ELF and …

more ...

Insomnihack 2016 smartstove writeup

Here is another writeup for a pwnable challenge I solved during the Insomni'hack CTF. We are given a x86_64 ELF, so as usual we'll check the binary protections first with checksec:

Arch:     amd64-64-little
RELRO:    Partial RELRO
Stack:    No canary found
NX:       NX enabled
PIE:      No PIE

OK, it's a ELF64 …

more ...

31c3ctf devilish writeup

This is my first ctf writeup so I hope it won't be to horrible. And sorry in advance for my bad English.

I'll talk about devilish a web challenge from the 31c3ctf 2014 CTF. I'll give credit to one of our team members on this one "Michael", because we were …

more ...

Ghost in the shellcode cloudfs writeup 2015

Category: Forensics Points: 200 Description:Find the key! (File)

The file we were given if a pcapng file. To be able to read'it with scapy we need to convert it to pcap. The easiest way is to use tcpdump as so:

tcpdump -r cloudfs-31c938df3531611b82fddf0685784a2b67373305ec689015f193a555b756beb2 -w cloudfs.pcap

Use scapy to …

more ...

Practical tips for reverse engineering

Another great video from Gynvael with realy cool tips for reverse engineering. This video helped me a lot so I hope it will be useful for you too.

Full title:

"Data, data, data! I can't make bricks without clay." A few practical notes on reverse-engineering.

The talk was done as …

more ...

Gynvaels [EN] CTF: Binathlon (400)

Here is a small video by Gynvael from Dragon Sector CTF team with shows a rely nice Reverse Engineering task from the Binathlon CTF. Hope you enjoy'it as much as I did.

more ...

Compile and test your shellcode

This is a small bash script I created to test my shellcode in an automated way. This make it easy to create a C file and compile your shellcode to test if it works as it should. You need to give as argument to the script an .asm file with …

more ...