Skip to content

Commit

Permalink
🔗 📝 💾 📚 💊 Links, Challenges, Files, Syntax, Categories, CTFs (ctfs#2411)
Browse files Browse the repository at this point in the history
* 🔗 Added ABCTF and DefCamp links

* 📚 Added H4ckIT competition

* 💾 Added H4ckIT CTF challenge files

* 📝 Added FBCTF country names

* 💊 Fixed missing categories

* 📝 Added write-ups

* 🔗 Added link to DefCamp web writeup

* Standardizd 'write-up' syntax

* 💊 Capitalized readme for standardization

* 🔗💊 Added link and fixed readme bug

* 🔗💊 Added links and adjusted readme

* 📚💊🔗 Added TUM struct, h4ck&tum links, readme fixes

* 💊 Added link to ctf page readme

* Fixed merge error

* 🔗 More external write-up links

* 🔗 External link

* 🔗 💾 Added links, files, and tasks

* 🔗 Added TUM CTF links

* 🔗 💾 Added links and files from failedxyz

* 💊 🔗 Fixed syntax, added links

* 🔗 Added H4ckIT and TUM links

* 🔗 Added TUMCTF and H3ckIT links

* 🔗 Added H4ckIT CTF writeups


* 🔗 Added CSAW links

* 🔗 Added external writeups

* 🔗 Added external links

* 🔗 Added links

* :links: Added external H4ckIT links

* 🔗 Added external links

* 📚 Added HackoverCTF 2016

* 📚 Added HITCONCTF structure

* 💾 Added challenge files

* 💊 Updated READMEs

* 🔗 Added external links to hackover-ctf

* 🔗 Added HackoverCTF writeup link

* 📝 Added scoreboard local & remote

* 💊 🔗 Added links and readmes

* 🔗 Added external links

* 🔗 Added external links Hackover&Hitcon

* 🔗 Added external links

* 💊 Removed broken b01ler links

* 💊 Removed broken isecer.com links

* 💊 Corrected invalid CTF link

* 💊 Added Japenese labels where needed

* 💊 removed broken anksur links

* 💊 Removed broken oeaass links

* 💊 Fixed ctftime link to real dest

* 💊 Fixed wrong local link

* 💊 Removed broken hackeriet links

* 💊 Removed broken hamidx9 link

* 💊 Removed terminated youtube vid

* 💊 Removed broken unamer links

* 💊 Removed broken revers3r link

* 💊 Removed duplicate links

* 💊 Fixed broken local link

* 💊 Removed broken link

* 💊 Removed broken blahcat links

* 💊 Labeled Korean links

* 💊 Removed broken kof.kr links

* 💊 Fixed broken local links

* 💊 Fixed broken local links

* 💊 Added Russian label to countersite links

* 💊 Fixed broken local links

* 💊 Fixed broken local links

* 💊 Fixed broken local links

* 💊 Removed broken external links

* 💊 Removed broken external links

* 💊 Removed broken external links

* 💊 Removed broken external links

* 💊 Removed invalid label

* 💊 Fixed broken external link

* 💊 Removed terminated youtube vids

* 💊 Fixed broken external links

* 💊 Fixed broken local link

* 💊 Fixed README format

* 💊 Added Korean label to baronpig links

* 💊 Removed broken external links

* 💊 Fixed link distribution

* 💊 Removed broken external link

* 💊 Removed broken external links

* 💊 Fixed broken links

* 💊 Added france label

* 💊 Fixed local challenge link

* 💊 Fixed local challenge links

* 💊 Removed broken external link

* 💊 Removed broken external links

* 💊 Fixed none yets

* 💊 Added Vietnamese&Japanese links

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 💊 Fixed incorrect link

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 💊 Updated README

* 🔥 Deleted duplicate link

* 🔗 Added flame external link

* 🔗 📝 Added Let's Decrypt and link

* 🔗 Added handcrafted link

* 🔗 Moved task to correct category (ctfs#2353)

* 🔗 💊 Added link and fixed categories

* 💊 Updated README

* 🔗 📝 Added link, category names, task

* 💊 Updated README

* 📝 💾 Added qr task and files

* 📝 🔥 Added ish tasks and rm qr solution file

* 📝 Added reversing task

* 📝 💾 Added uconn tasks and files

* 🔗 Added CSAW external link

Closes ctfs#2410
Closes ctfs#2409
Closes ctfs#2408
Closes ctfs#2406
Closes ctfs#2404
Closes ctfs#2402
Closes ctfs#2400
Closes ctfs#2399
Closes ctfs#2398
Closes ctfs#2389
Closes ctfs#2381
Closes ctfs#2380
Closes ctfs#2368
Closes ctfs#2366
Closes ctfs#2358
Closes ctfs#2353
Closes ctfs#2352
Closes ctfs#2351
  • Loading branch information
Thomas Gerot authored Oct 13, 2016
1 parent 608ff46 commit c355493
Show file tree
Hide file tree
Showing 226 changed files with 741 additions and 594 deletions.
15 changes: 7 additions & 8 deletions 0ctf-2016/README.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# 0CTF write-ups

* [https://ctf.0ops.sjtu.cn/](https://ctf.0ops.sjtu.cn/)
* [Scoreboard](https://ctf.0ops.sjtu.cn/scoreboard) or [local alternative](scoreboard.txt)
* [No Longer Available](https://ctf.0ops.sjtu.cn/)
* [No Longer Available](https://ctf.0ops.sjtu.cn/scoreboard) or [local alternative](scoreboard.txt)

## Repo-local write-ups

Expand All @@ -18,24 +18,23 @@
* [reverse/trace-4](reverse/trace-4)
* [web/piapiapia-6](web/piapiapia-6)
* [web/monkey-4](web/monkey-4)
* [misc/opm-3](misc/opm-3)
* [web/guestbook-2-7](web/guestbook-2-7)
* [mobile/state-of-the-art-5](mobile/state-of-the-art-5)
* [web/rand_2-2](web/rand_2-2)
* [crypto/peoples-square-6](crypto/peoples-square-6)
* [web/guestbook-1-7](web/guestbook-1-7)
* [Dragon Sector write-ups](http://dragonsector.pl/docs/0ctf2016_writeups.pdf) (web/monkey-4, web/rand_r-2, web/piapiapia-6, pwn/(*  ̄3)(ε ̄ *)-8, misc/xor_painter-4, re/momo-3, mobile/boomshakalaka-3, pwn/sandbox-5, crypto/equation-3, re/trace-4, crypto/rsa-2, pwn/warmup-2, misc/0pm-3, mobile/state-of-the-art-5)
* [misc/xor-painter-4](misc/xor-painter-4)

## Missing write-ups

* [crypto/arsenal-8](crypto/arsenal-8)
* [crypto/peoples-square-6](crypto/peoples-square-6)
* [exploit/3-3](exploit/3-3)
* [exploit/freecell-7](exploit/freecell-7)
* [exploit/jeap-10](exploit/jeap-10)
* [misc/checkin-1](misc/checkin-1)
* [misc/opm-3](misc/opm-3)
* [misc/xor-painter-4](misc/xor-painter-4)
* [mobile/state-of-the-art-5](mobile/state-of-the-art-5)
* [mobile/webdroid++-7](mobile/webdroid++-7)
* [reverse/momo-3](reverse/momo-3)
* [reverse/overheard-6](reverse/overheard-6)
* [reverse/papi-8](reverse/papi-8)
* [reverse/vm-7](reverse/vm-7)
* [web/guestbook-2-7](web/guestbook-2-7)
1 change: 0 additions & 1 deletion 0ctf-2016/exploit/warumup-2/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,5 @@

## Other write-ups and resources

* <https://b01lers.net/challenges/0ctf2016/Warmup/98/>
* <https://www.whitehatters.academy/0ctf-2016-warmup/>
* [Japaneese](http://shift-crops.hatenablog.com/entry/2016/03/14/181405)
1 change: 0 additions & 1 deletion 0ctf-2016/web/monkey-4/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,4 +24,3 @@
* <https://secgroup.github.io/2016/03/14/0ctf-writeup-monkey/>
* <http://zepvn.com/2016-03-14-0ctf-2016-monkey.html>
* <https://w00tsec.blogspot.de/2016/03/0ctf-2016-write-up-monkey-web-4.html>
* <http://www.isecer.com/ctf/0ctf_2016_web_writeup_monkey.html>
3 changes: 1 addition & 2 deletions 0ctf-2016/web/piapiapia-6/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,5 +14,4 @@

## Other write-ups and resources

* <https://github.com/p4-team/ctf/tree/master/2016-03-12-0ctf/piapiapia>
* [Chineese](http://www.isecer.com/ctf/0ctf_2016_web_writeup_piapiapia.html)
* <https://github.com/p4-team/ctf/tree/master/2016-03-12-0ctf/piapiapia>
3 changes: 1 addition & 2 deletions 0ctf-2016/web/rand_2-2/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,5 +17,4 @@

## Other write-ups and resources

* <https://github.com/p4-team/ctf/tree/master/2016-03-12-0ctf/rand_2>
* [Chineese](http://www.isecer.com/ctf/0ctf_2016_web_writeup_rand_2.html)
* <https://github.com/p4-team/ctf/tree/master/2016-03-12-0ctf/rand_2>
2 changes: 1 addition & 1 deletion abctf-2016/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,6 @@
* [reversing/java-madness-50](reversing/java-madness-50)
* [ppc/qset1-100](ppc/qset1-100)
* [ppc/racecar-100](ppc/racecar-100)
* [ppc/qset2-150](ppc/qset2-150)
* [ppc/obfuscated1-130](ppc/obfuscated1-130)
* [ppc/qset3-200](ppc/qset3-200)
* [ppc/slime-season3-60](ppc/slime-season3-60)
Expand Down Expand Up @@ -59,3 +58,4 @@

## Missing write-ups

* [ppc/qset2-150](ppc/qset2-150)
1 change: 0 additions & 1 deletion abctf-2016/crypto/a-small-broadcast-125/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,5 +15,4 @@ I RSA encrypted the same message 3 different times with the same exponent. Can y

* https://kimiyuki.net/blog/2016/07/23/abctf-2016/
* http://rawsec.ml/en/ABCTF-125-A-Small-Broadcast-Cryptography/
* http://blog.ankursundara.com/abctf/
* https://ctftime.org/writeup/3618
5 changes: 2 additions & 3 deletions abctf-2016/crypto/aes-mess-75/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,8 +5,8 @@
**Solves:** 182
**Description:**

We encrypted a flag with AES-ECB encryption using a secret key, and got the hash: e220eb994c8fc16388dbd60a969d4953f042fc0bce25dbef573cf522636a1ba3fafa1a7c21ff824a5824c5dc4a376e75
However, we lost our plaintext flag and also lost our key and we can't seem to decrypt the hash back :(.
We encrypted a flag with AES-ECB encryption using a secret key, and got the hash: e220eb994c8fc16388dbd60a969d4953f042fc0bce25dbef573cf522636a1ba3fafa1a7c21ff824a5824c5dc4a376e75
However, we lost our plaintext flag and also lost our key and we can't seem to decrypt the hash back :(.
Luckily we encrypted a bunch of other flags with the same key. Can you recover the lost flag using this?

[HINT] There has to be some way to work backwards, right?
Expand All @@ -20,4 +20,3 @@ Luckily we encrypted a bunch of other flags with the same key. Can you recover t
## Other write-ups and resources

* https://kimiyuki.net/blog/2016/07/23/abctf-2016/
* http://blog.ankursundara.com/abctf/
1 change: 0 additions & 1 deletion abctf-2016/crypto/custom-authentication-160/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,5 @@ I just learned about encryption and tried to write my own authentication system.

## Other write-ups and resources

* http://blog.ankursundara.com/abctf/
* https://ctftime.org/writeup/3620
* https://p-te.fr/2016/07/23/abctf-custom-authentication/
3 changes: 1 addition & 2 deletions abctf-2016/crypto/encryption-service-140/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
**Solves:** 74
**Description:**

See if you can break this!!
See if you can break this!!
You can connect with nc 107.170.122.6 7765 and the source can be found here.

## Write-up
Expand All @@ -15,7 +15,6 @@ You can connect with nc 107.170.122.6 7765 and the source can be found here.
## Other write-ups and resources

* https://kimiyuki.net/blog/2016/07/23/abctf-2016/
* http://blog.ankursundara.com/abctf/
* https://ctftime.org/writeup/3622
* https://www.doyler.net/security-not-included/ecb-chosen-plaintext-attack
* https://p-te.fr/2016/07/23/abctf-encryption-service/
1 change: 0 additions & 1 deletion abctf-2016/crypto/old-rsa-70/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,4 +15,3 @@ I'm sure you can retrieve the flag from this file.
## Other write-ups and resources

* https://kimiyuki.net/blog/2016/07/23/abctf-2016/
* http://blog.ankursundara.com/abctf/
1 change: 0 additions & 1 deletion abctf-2016/crypto/sexy-rsa-160/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,5 @@ Check this out!
## Other write-ups and resources

* https://kimiyuki.net/blog/2016/07/23/abctf-2016/
* http://blog.ankursundara.com/abctf/
* https://ctftime.org/writeup/3621
* https://p-te.fr/2016/07/23/abctf-sexy-rsa/
1 change: 0 additions & 1 deletion abctf-2016/forensic/passwordpdf-80/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,4 +16,3 @@ Oh no. We locked this PDF and forgot the password. Can you help us?
## Other write-ups and resources

* https://kimiyuki.net/blog/2016/07/23/abctf-2016/
* http://blog.ankursundara.com/abctf/
1 change: 0 additions & 1 deletion abctf-2016/forensic/zippy-120/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,4 +14,3 @@ If your could fix this mess I am sure there would be a flag waiting for you.
## Other write-ups and resources

* http://junk-coken.hatenablog.com/entry/2016/07/24/030423
* http://blog.ankursundara.com/abctf/
2 changes: 1 addition & 1 deletion abctf-2016/ppc/obfuscated1-130/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,6 @@ Get this to return true! The grader runs the same script as you got! Here it is.
## Other write-ups and resources

* https://github.com/qux-bbb/ABCTF-2016_writeup/blob/master/Obfuscated_1/Obfuscated_1.md
* http://yuelab82.hatenablog.com/entry/2016/07/24/042028
* (Japanese) http://yuelab82.hatenablog.com/entry/2016/07/24/042028
* https://www.doyler.net/security-not-included/deobfuscate-python-abctf
* https://p-te.fr/2016/07/25/abctf-obfuscated-1-130/
3 changes: 1 addition & 2 deletions abctf-2016/ppc/qset1-100/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

**Category:** Ppc
**Points:** 100
**Solves:**
**Solves:**
**Description:**

I created my own programming language and wrote an interpreter for it! [Here](https://gist.github.com/bobacadodl/ba0ae21af8204d9fa8bab566f4186565) it is. Can you create a program to multiply 2 inputs? nc 107.170.122.6 7771
Expand All @@ -18,4 +18,3 @@ o0/i0,o0/i1
## Other write-ups and resources

* https://kimiyuki.net/blog/2016/07/23/abctf-2016/
* http://blog.ankursundara.com/abctf/
3 changes: 1 addition & 2 deletions abctf-2016/ppc/qset2-150/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,5 +13,4 @@ Time for something harder.. write a program to calculate the square root of an i

## Other write-ups and resources

* https://kimiyuki.net/blog/2016/07/23/abctf-2016/
* http://blog.ankursundara.com/abctf/
* none yet
1 change: 0 additions & 1 deletion abctf-2016/ppc/qset3-200/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,4 +14,3 @@ Calculate an RSA private key 107.170.122.6 7773
## Other write-ups and resources

* https://kimiyuki.net/blog/2016/07/23/abctf-2016/
* http://blog.ankursundara.com/abctf/
2 changes: 1 addition & 1 deletion abctf-2016/ppc/tgif-30/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,5 @@ Read-in every date and use python-datetime to calculate the weekday in the next
## Other write-ups and resources

* http://rawsec.ml/en/ABCTF-30-TGIF-Programming/
* http://yuelab82.hatenablog.com/entry/2016/07/24/042028
* (Japanese) http://yuelab82.hatenablog.com/entry/2016/07/24/042028
* https://ctftime.org/writeup/3617
1 change: 0 additions & 1 deletion abctf-2016/reversing/frozen-recursion-250/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,5 +15,4 @@ I finally learned recursion! Am I doing it right? Here it is.

* https://kimiyuki.net/blog/2016/07/23/abctf-2016/
* https://tsunpoko.github.io/abctf2016/
* http://blog.ankursundara.com/abctf/
* https://p-te.fr/2016/07/16/abctf-frozen-recursion-250-2/
1 change: 0 additions & 1 deletion abctf-2016/reversing/js-pls-80/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,5 +14,4 @@ Can you figure out the flag from this Have fun ;)
## Other write-ups and resources

* https://github.com/qux-bbb/ABCTF-2016_writeup/blob/master/JS_PIs/JS_PIs.md
* http://blog.ankursundara.com/abctf/
* https://www.doyler.net/security-not-included/javascript-deobfuscation-abctf
2 changes: 1 addition & 1 deletion abctf-2016/virtual/virtual-box1-10/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,4 +19,4 @@ But the file flag 1.doc on the desktop contained the real flag...
## Other write-ups and resources

* http://rawsec.ml/en/ABCTF-10-Virtual-Box-1-Virtual-Series/
* http://yuelab82.hatenablog.com/entry/2016/07/24/042028
* (Japanese) http://yuelab82.hatenablog.com/entry/2016/07/24/042028
2 changes: 1 addition & 1 deletion abctf-2016/virtual/virtual-box2-15/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,4 +16,4 @@ Or give another text color;-)
## Other write-ups and resources

* http://rawsec.ml/en/ABCTF-15-Virtual-Box-2-Virtual-Series/
* http://yuelab82.hatenablog.com/entry/2016/07/24/042028
* (Japanese) http://yuelab82.hatenablog.com/entry/2016/07/24/042028
2 changes: 1 addition & 1 deletion abctf-2016/virtual/virtual-box3-35/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,4 +17,4 @@ Opening it with any capable programm reveals the flag...
## Other write-ups and resources

* http://rawsec.ml/en/ABCTF-35-Virtual-Box-3-Virtual-Series/
* http://yuelab82.hatenablog.com/entry/2016/07/24/042028
* (Japanese) http://yuelab82.hatenablog.com/entry/2016/07/24/042028
2 changes: 1 addition & 1 deletion abctf-2016/virtual/virtual-box4-60/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,4 +19,4 @@ Giving us the flag: ABCTF{Y0U_F0UND_ME}
## Other write-ups and resources

* http://rawsec.ml/en/ABCTF-60-Virtual-Box-4-Virtual-Series/
* http://yuelab82.hatenablog.com/entry/2016/07/24/042028
* (Japanese) http://yuelab82.hatenablog.com/entry/2016/07/24/042028
2 changes: 1 addition & 1 deletion abctf-2016/virtual/virtual-box5-75/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,4 +17,4 @@ Decoded: ABCTF{ITS_C00L_L00KING_BACK}
## Other write-ups and resources

* http://rawsec.ml/en/ABCTF-75-Virtual-Box-5-Virtual-Series/
* http://yuelab82.hatenablog.com/entry/2016/07/24/042028
* (Japanese) http://yuelab82.hatenablog.com/entry/2016/07/24/042028
2 changes: 1 addition & 1 deletion abctf-2016/virtual/virtual-box6-75/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,4 +15,4 @@ It was the pattern shown in the description, followed by the flag...

## Other write-ups and resources

* http://yuelab82.hatenablog.com/entry/2016/07/24/042028
* (Japanese) http://yuelab82.hatenablog.com/entry/2016/07/24/042028
14 changes: 7 additions & 7 deletions abctf-2016/virtual/virtual-box7-100/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,24 +10,24 @@ Hmm, I wish I could figure out the team that created Windows 98 without the map
## Write-up

This one was little bit tricky...
A little google-search revealed there's a easter-egg in Win98 regarding the
A little google-search revealed there's a easter-egg in Win98 regarding the
developement-team's credit animation.

There are two way's of accessing it, one is related to the "map hassle" and
the other one to the solution, which is described [here](http://www.eeggs.com/items/484.html).
the other one to the solution, which is described [here](http://www.eeggs.com/items/484.html).

I spent quite some time getting the easter egg running, but it didn't seem to work
correctly.
correctly.

I thought they placed the flag in the team members enumeration, so I managed to dump the XML-file
which is used in the Weldata.exe... but there wasn't any flag in there:(
which is used in the Weldata.exe... but there wasn't any flag in there:(

Finally I thought the easter-egg magic string "You_are_a_real_rascal" looks quite like a flag...
so I tried: ABCTF{You_are_a_real_rascal} and...

so I tried: ABCTF{You_are_a_real_rascal} and...

BOOM! It worked:)

## Other write-ups and resources

* http://yuelab82.hatenablog.com/entry/2016/07/24/042028
* (Japanese) http://yuelab82.hatenablog.com/entry/2016/07/24/042028
18 changes: 8 additions & 10 deletions abctf-2016/web/audio-edit-200/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ I used [easyTAG](https://wiki.gnome.org/Apps/EasyTAG) but of course you can use
In order to do an injection and maintain a valid INSERTION statement you can create an mp3
with the following meta data:


title = "" (leer)
author = a', (SELECT @@version))-- -b

Expand All @@ -44,7 +44,7 @@ discarded...
This gave us the database version: 5.5.49-0ubuntu0.14.04.1

Next we wanted to know the database name:

author = a', (SELECT database()))-- -b:
audioedit

Expand All @@ -60,22 +60,22 @@ And of course the column names:
So finally we wanted see whats in there:

author = a',(SELECT author FROM audioedit.audioedit LIMIT 0,1))-- -a

... but this gave us an insertion error!:(

The problem is you can't select from a database that you're inserting into at the same time... Thanks to Arxenix!:)

So we got around by using AS:

author = a',(SELECT author FROM audioedit.audioedit as blub LIMIT 0,1))-- -a:
ABCTF
ABCTF
author = a',(SELECT title FROM audioedit.audioedit as blub LIMIT 0,1))-- -a:
flag
flag
author = a',(SELECT file FROM audioedit.audioedit as blub LIMIT 0,1))-- -a:
supersecretflagf1le.mp3

Using this info we visited the corresponding site: http://107.170.122.6/audioedit/edit.php?file=supersecretflagf1le.mp3

Setting the visualization to 'Sonogram' finally showed us the flag:

ABCTF{m3t4_inj3cti00n}
Expand All @@ -84,6 +84,4 @@ Setting the visualization to 'Sonogram' finally showed us the flag:

## Other write-ups and resources

* http://countersite.org/articles/web-vulnerability/105-audioedit-writeup.html

* http://blog.ankursundara.com/abctf/
* (Russian) http://countersite.org/articles/web-vulnerability/105-audioedit-writeup.html
1 change: 0 additions & 1 deletion abctf-2016/web/meteor-smash-100/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,4 +23,3 @@ Looking for `meteor user.profile admin exploit` shows us the [3rd link](https://
## Other write-ups and resources

* none yet
* http://blog.ankursundara.com/abctf/
2 changes: 1 addition & 1 deletion alictf-2016/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,9 +13,9 @@
* [reversing/ColorOverflow-100](reversing/ColorOverflow-100)
* [pwn/fb-100](pwn/fb-100)
* [web/Homework-400](web/Homework-400)
* [pwn/fb-100](pwn/fb-100)

## Missing write-ups

* [pwn/fb-100](pwn/fb-100)
* [crypto/showmethemoney-50](crypto/showmethemoney-50)
* [web/FinalBook-100](web/FinalBook-100)
4 changes: 2 additions & 2 deletions angstromctf-2016/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,10 +18,8 @@
* [crypto/what-the-hex-15](crypto/what-the-hex-15)
* [crypto/brute-force-40](crypto/brute-force-40)
* [crypto/spqr-10](crypto/spqr-10)
* [forensics/wherizmaicheezburgr](forensics/wherizmaicheezburgr)
* [forensics/volatile-90](forensics/volatile-90)
* [forensics/whoops-30](forensics/whoops-30)
* [forensics/metasploitable-120](forensics/metasploitable-120)
* [forensics/recovery-10](forensics/recovery-10)
* [re/smartest-encryption-70](re/smartest-encryption-70)
* [re/java-is-the-best-50](re/java-is-the-best-50)
Expand All @@ -31,8 +29,10 @@

## Missing write-ups

* [forensics/metasploitable-120](forensics/metasploitable-120)
* [binary/answer-machine-110](binary/answer-machine-110)
* [binary/shellcode-60](binary/shellcode-60)
* [forensics/wherizmaicheezburgr-80](forensics/wherizmaicheezburgr-80)
* [binary/rop2libc-160](binary/rop2libc-160)
* [crypto/actf-casino-120](crypto/actf-casino-120)
* [crypto/randomized-cipher-250](crypto/randomized-cipher-250)
Expand Down
7 changes: 3 additions & 4 deletions angstromctf-2016/binary/endian-of-the-world-40/README.md
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
# angstromCTF 2016 : endian-of-the-world-40

**Category:** Binary
**Points:**
**Solves:**
**Points:**
**Solves:**
**Description:**

> The end of the world is nigh! Dr. Doomsday has created an evil contraption to destroy the planet, and only a single password can stop it! We were able to recover the source code for the password check. Find the shortest password that will stop Dr. Doomsday's machine and save the world! The program is available on the shell server at /problems/[endian](./endian)_of_the_world/, and the binary and source are provided.
> The end of the world is nigh! Dr. Doomsday has created an evil contraption to destroy the planet, and only a single password can stop it! We were able to recover the source code for the password check. Find the shortest password that will stop Dr. Doomsday's machine and save the world! The program is available on the shell server at /problems/[endian](./endian)\_of_the_world/, and the binary and source are provided.

## Write-up
Expand All @@ -14,5 +14,4 @@

## Other write-ups and resources

* http://blog.oleaass.com/writeups/angstrom-ctf-2016-endian-of-the-world/
* http://ipushino.blogspot.com/2016/04/angstromctf-2016-endian-of-world-binary.html
Loading

0 comments on commit c355493

Please sign in to comment.