During last day I had a pleasure to play FristiLEaks CTF prepared by Ar0xA. Thanks! ;)
It was a good idea to choose this one as well as a lot of fun when I was wondering how to get root.
Below you will find a solution how to get the flag (and to "love Fristi"! ;))
(For those who want to read other writeups for Fristi, you can find them here.)
Here we go...
Showing posts with label writeup. Show all posts
Showing posts with label writeup. Show all posts
Friday, 13 May 2016
Monday, 9 May 2016
CrackMe by Rapture - solved
Hi,
this time we will analyze and patch another small and simple .NET crackme.
This time we will check "FishMe #1 by Rapture". You can find it at crackmes.de.
Like before we need HxD and .NET Reflector (but you can use your favourite tools to do it as well).
Let's get to work!
this time we will analyze and patch another small and simple .NET crackme.
This time we will check "FishMe #1 by Rapture". You can find it at crackmes.de.
Like before we need HxD and .NET Reflector (but you can use your favourite tools to do it as well).
Let's get to work!
CrackMe by Rayko - solved
During last few days I was checking crackmes from this page (BTW great place to check if you're learning reversing and cracking).
Below you will find one simple solution for crackme found in ".Net" category: CrackMe By Rayko.
Below you will find one simple solution for crackme found in ".Net" category: CrackMe By Rayko.
Thursday, 3 March 2016
BrokenWebapps - CTF writeup
When I was looking for a new CTF, I found interesting website with multiple CTFs ISO and VM images, prepared (vulnerable) to hack. I decided to try OWASP Project called BrokenWebapps (VM I’ve tried was OWASP_Broken_Web_Apps_VM_1.2).
I prepared the VM and started another one (this time with Kali2.0 – both on VirtualBox). As far as I know, we can treat this VM as a big WWW server, hosting multiple webpages.
I prepared the VM and started another one (this time with Kali2.0 – both on VirtualBox). As far as I know, we can treat this VM as a big WWW server, hosting multiple webpages.
Sunday, 27 December 2015
Joomla CVE-2015-7857 writeup
(I wrote this as a 'note' in 14.12.2015 but in case that all information are already public,
below you will find proof of concept and little write-up for vulnerability described in this CVE.)
below you will find proof of concept and little write-up for vulnerability described in this CVE.)
Labels:
0day,
code review,
exploit,
Joomla,
projects,
research,
vulnerability,
writeup
Subscribe to:
Posts (Atom)