Date: April 16, 2023 team: ST4RT There were two javascript&css reversing challenges in Plaid CTF, I had a headache, so just solved two easy challenges Treasure Map - REV import { go } from "...
(CTF) LINE CTF 2023 fishing writeup
Date: March 25, 2023 rank: 60 team: ST4RT fishing - rev ( 166 pt, 32 solve ) In _main function, calls _do_global_ctors and functions at 0x140004100 are called in turn _main 함수에서 _do_global_c...
(CTF) 2023 b01lers CTF writeup
Date: March 20, 2023 rank: 19 team: ST4RT cfifuuufuuuuu ( 398 pt, 13 solve ) there are two files loader.pyc, a binary while 1: # res = ptrace(PTRACE_GETREGS, pid, 0, ctypes.addressof(regs)) ...
(CTF) 2022 hxp required writeup
rank: 68 required ( 182 pt, 43 solve ) f=[...require('fs').readFileSync('./flag')] require('./28')(753,434,790) require('./157')(227,950,740) require('./736')(722,540,325) require('./555')(937,26...
(CTF) 2022 Seccon Doroboh writeup
대회기간에는 못풀었는데 아쉬워서 풀이 참고해 적어봄 The following diagram discribes what each file is. Do not run araiguma.exe unless you fully understand the logic. +-- Victim Machine --+ +-- Attacker Machine --...
(CTF) b01lers CTF 2022
difficulty: 🩸 rank: 70 writeup: rev(1) TM ( 🩸 247 pt, 45 solve ) TL;DR : simple function poiner vm __int64 __fastcall main(__int64 a1, char **a2, char **a3) { int ReturnValue; // [rsp+4h] [rbp...
(CTF) HackPack 2022 writeup
difficulty: 🩸🩸 rank: 18 writeup: rev(1) Shiftycode ( 🩸🩸 481 pt, 11 solve ) TL;DR : simple vm The vmcode file bin and binary shiftycode are given, Seeing the decompile code, It read the vm code...