Questions tagged [ctf]

In a computer hacking context, a Capture The Flag (CTF) challenge invites participants to extract a hidden piece of information called a "flag" (usually a short string of ASCII text) from vulnerable online systems or downloadable files through the application of skills in various fields such as cryptography, steganography and reverse engineering. Typically this involves bypassing poorly-implemented security measures.

In a computer hacking context, a Capture The Flag (CTF) challenge invites participants to extract a hidden piece of information called a "flag" (usually a short string of ASCII text) from vulnerable online systems or downloadable files through the application of skills in various fields such as , and . Typically this involves bypassing poorly-implemented security measures.

162 questions
0
votes
1 answer

RSA - CTF Encrypt and Decrypt

I am currently trying to solve a practice CTF challenge on RSA. The source code of the challenge is the following: from Crypto.Util.number import getStrongPrime, bytes_to_long from secret import flag p = getStrongPrime(1024) n = p*p ct =…
Shark44
  • 593
  • 1
  • 4
  • 11
0
votes
0 answers

Send and receive data to server in while loop (socket)

I'm currently working on a CTF challenge which runs on server, here is the part I need help with: .... while True: menu() #display 4 options cmd = int(input(">> ")) if cmd == 1: #do something elif cmd == 2: #do something elif…
LilLee
  • 11
0
votes
0 answers

What exactly does AndroidManifest.XML show in my .apk file? My current assignment is to obtain 2 flags

screenshot of the AndroidManifest.XML file I've tried downloading APKtool package to decompile the apk file however I am unable to download any packages due to the restriction of my assignment. Im not sure what else I can do. This .apk file comes…
Avrius
  • 1
  • 1
0
votes
0 answers

fallocate -l 8E haystack.bin

I'm facing a ctf and I'm facing an 8exabytes big problem. The flag is inside a bin file which is inside a gz file. The creation took place in these steps: §Mounted my 10 exabyte flash drive §fallocate -l 8E haystack.bin §dd if=flag.txt bs=1…
0
votes
0 answers

challenge: robots file of ctf (capture the flag)

User-agent: * Disallow: / Disallow: /index.css Disallow: /index.js # This site is unhackable, so I'm going to taunt you a bit with an inaccessible file. Disallow: /emoji/../../../flag.txt robots.txt file downloaded for ctf suggestions?
mitre
  • 1
  • 1
0
votes
0 answers

Regular expression bypassing

I am solving the ctf challenge. Is it possible to bypass this RE and execute JS injection? P.S Don't worry, this is not a competitive…
Kubbi
  • 1
  • 2
0
votes
0 answers

How to use netcat or socat to execute an elf type file that compiled from C language like CTF

Like the title saying. I have a C program and I compile it to an ELF by using gcc. Now I want to run this ELF up and using netcat to proxy it. Let client can netcat to service then send message and get response I run the command below nc -lp 8763 -e…
0
votes
0 answers

On-demand Pods for a training platform

I'm trying to create a training/labs platform that would allow anyone to have an isolated pod/container to connect to and play with it. I was initially planning to do it in two steps: Have the user request a new instance into a "Manager", which…
fr0zn
  • 1
  • 1
0
votes
0 answers

How to extract Zlib from JPG

I'm currently doing a forensics CTF challenge, where the flag is hidden inside a .jpg file. When I do binwalk on the file, I see the following: DECIMAL HEXADECIMAL …
0
votes
0 answers

x86 Assembly: Creating a shellcode to write to a file after successful buffer overflow

Hi Stack Overflow community, I am currently working on a CTF challenge, where I need to perform a buffer overflow on a C program and then execute a shellcode to create and write to a file. The given C program is as follows: #include…
0
votes
0 answers

OpenSSL decrypt AES-ECB-256 encrypted password - can't figure out the right syntax

I am trying to decrypt aes-256-ecb encoded password using OpenSSL with the following (captured during a ctf only) informations: ##PASS_16## oRnS7llE9q3utIvyP1rbK4OPVDjOPdEss36jsgu/Yvfh9yx0qR530oV8eLH9fxw2 AES-ECB-256 Key :…
Ekel
  • 33
  • 5
0
votes
0 answers

error reading solve script template: error reading "/home/mike/.config/pwninit-template.py"

While I was trying to run pwninit I was getting the following error error: failed making template solve script: error reading solve script template: error reading "/home/mike/.config/pwninit-template.py": No such file or directory (os error…
Mike
  • 9
  • 3
0
votes
2 answers

Stuck on 16 - 17 level of Overthewire bandit game

I'm playing the CTF game on Overthewire and stuck on 16 - 17 where you got a public key and have to submit it to play the next level. I got the public key saved at /tmp/ and set read only for the user.Then proceed to submit it by this command ssh -i…
0
votes
1 answer

Trying to figure out what those bytes are

I've got 6 arrays of bytes, that I'm trying to interpret. Here they are : 1st array : 72B45CAA466333A5CC5AA6ADC3CF1279D1EC8 2nd array : 72B45CAA466336E4933314330BC656FB05418 3rd array : 6CBD77AB562B2AECA6DC9AC88BC496FB05448 4th array :…
Prismey
  • 11
  • 2
0
votes
0 answers

why is ghidra assigning main to a local variable?

I'm playing a CTF, while looking into the disassembly of a binary file I can't get my head arround this two instructions local_28 = main; 00101251 48 89 45 e0 MOV qword ptr [RBP + local_28],RAX=>main and global_var = globalvar; MOV …