zacheller@home:~/blog$

  • 247/CTF - TIPS AND TRICKS

    Prompt Utilise a programming language to interface with the socket and automate solving 500 simple addition problems to receive the flag. Take care when interfacing with unknown remote services - ‘\n’ is not the only way to end a line! Solution #!/usr/bin/env python3 from pwn import * URL="54774aadc5a56c41.247ctf.com" PORT=50488 #...

  • 247/CTF - MY MAGIC BYTES

    Prompt Can you recover the secret XOR key we used to encrypt the flag? Solution Our file my_magic_bytes.jpg.enc is an encrypted jpg (at least that’s what the extension .jpg.enc leads us to believe). While this might be misdirection, let’s start by assuming it is an encrypted JPEG. Because we know...

  • TryHackMe - Vulnversity

    This is a writeup for Vulnversity on TryHackMe. Reconnaissance root@kali:~/TryHackMe/vulnversity# nmap -sV 10.10.149.14 Starting Nmap 7.80 ( https://nmap.org ) at 2020-08-12 20:04 EDT Nmap scan report for 10.10.149.14 Host is up (0.16s latency). Not shown: 994 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3 22/tcp open ssh...

  • SpiderLabs CTF @ Blackhat 2020

    My team B34R5H3LL-RED competed in the SpiderLabs CTF at Virtual Blackhat from Thursday, August 6 at 6:00 pm PST to August 8 at 6:00 pm PST. We started with an early lead and kept 1st place for the first 8 or so hours. We ended with 1350 points in 39th...