ctfwriteup.wordpress.com
Microcorruption – Cusco | ctf-writeup
https://ctfwriteup.wordpress.com/2014/05/03/microcorruption-cusco
A fine WordPress.com site. Microcorruption – Johannesburg →. This level is stack overflow. When we input data, we can see address contain that value input at 0x43e0. After then, program execute test password valid. We trace step (s) one by one line code. First, when use value to test password, pointer at 0x43e0. After, trace to near 0x453e, we see pointer(sp) change point at 0x43f0. And we continue trace, pointer go back to. Leave a Reply Cancel reply. Enter your comment here. Address never made public).
tallinnit.blogspot.com
tallinnIT: 9.02 kell 15:30 Pelgulinna Gümnaasim - häkkerlapsed
http://tallinnit.blogspot.com/2015/01/902-kell-1530-pelgulinna-gumnaasim.html
Monday, January 12, 2015. 902 kell 15:30 Pelgulinna Gümnaasim - häkkerlapsed. Ainesektsioon kohtub Pelgulinna Gümnaasiumis. 9 veebruaril kell 15:30 arvutiklassis. Teema: Kuidas õpetada häkkerit? 2015-02-09 Kuidas õpetada häkkerit? Https:/ www.youtube.com/watch? Tänud Edmundile, kes operaator "Kõps" oli. Juttu tuleb ajalooliselt kes on häkker, kuidas õppimine ja õpetamine on muutunud. Milliseid noori vajame tulevikus, mis toimub internetis ja noorte kogukondades praegu. Posted by Birgy Lorenz. Tallinna ko...
nortonwang.com
Norton Wang | You should do coding challenges
http://nortonwang.com/2014/01/you-should-do-coding-challenges
You should do coding challenges. January 23, 2014. The only way to get better at programming is to just do it. But how? Sure, you can go off and build a side project, but that's hard. Staying motivated enough to complete it is difficult, and something that I have trouble doing. You can go and pick up a programming book and work through their exercises, but that gets boring fast. What sort of challenges are there? Perhaps the most obvious one is Project Euler. On the other hand, sites like Coderbyte.
jpaglier.blogspot.com
lets play - infosec: Microcorruption I - New Orleans
http://jpaglier.blogspot.com/2015/02/microcorruption-i-new-orleans.html
Lets play - infosec. Security, write ups, whatever else I feel like. Wednesday, February 18, 2015. Microcorruption I - New Orleans. Lately I've been working on going through the Matasano Microcorruption. Challenges - they're binary challenges with a story based on hacking electronic locks blah blah web based debugger blah blah. Level 1 is pretty easy - the main() method calls a method called create password() which builds a string which (no surprises here) is the password. Microcorruption IX - Santa Cruz.
antoine.kepeklian.com
microcorruption | The red-shirt
http://www.antoine.kepeklian.com/category/ctf/microcorruption
Aller au contenu principal. Archives de Catégorie: microcorruption. Microcorruption – Hanoï. Nous nous dirigeons maintenant vers Hanoï. Quand nous lisons le code désassemblé, nous repérons deux symboles intéressants : test password valid. Tout d’abord extrayons nos deux symboles. Test password valid: push r4 mov sp, r4 incd r4 decd sp mov.b #0x0, -0x4(r4) mov #0xfffc, r14 add r4, r14 push r14 push r15 push #0x7d call #0x457a INT mov.b -0x4(r4), r15 sxt r15 add #0x8, sp pop r4 ret. Traduisons les en C.
antoine.kepeklian.com
Présentation | The red-shirt
http://www.antoine.kepeklian.com/tag/presentation
Aller au contenu principal. Archives de Tag: Présentation. Capture The Flag par succession d’épreuves. En ligne. Il a une spécificité notoire : la rétro-ingénierie ou reverse engineering. Permet de pouvoir faire de la rétro-ingénierie logiciel ayant l’architecture. Lire la suite →. Capture The Flag par succession d’épreuves. Les dix derniers articles. Microcorruption – Hanoï. Microcorruption – Sydney. Microcorruption – New orleans. Fièrement propulsé par WordPress. Thème Superhero par WordPress.com.
metaltech.gronerth.com
Desarmando cosas
http://metaltech.gronerth.com/junta_fuga_para__mflowfree_la_vida_dim_hacklet__proyectoeste_mensaje_s_autaadir_cable_cobre_-i1163.html
The metaltech Prize: A Ternary Computer. Las gente en seguridad de Matasano y plaza se han unido para construir la competición de indicador (CTF) a una captura en línea. El Microcorruption CTF. Enfoques sobre seguridad empotrada y reproductores de desafíos aplicar ingeniería inversa a un "Lockitall LockIT profesional" sistema de bloqueo ficticio. El reloj de Nixie usa RTC de software ingenioso. Right Hand Loses Job As Head-Mouse Enters Mousing Arena. Investigar en la casa(2). Investigar a las laptos(0).
antoine.kepeklian.com
Antoine Képéklian | The red-shirt
http://www.antoine.kepeklian.com/author/antoine
Aller au contenu principal. Archives d’Auteur: Antoine Képéklian. Microcorruption – Hanoï. Nous nous dirigeons maintenant vers Hanoï. Quand nous lisons le code désassemblé, nous repérons deux symboles intéressants : test password valid. Tout d’abord extrayons nos deux symboles. Test password valid: push r4 mov sp, r4 incd r4 decd sp mov.b #0x0, -0x4(r4) mov #0xfffc, r14 add r4, r14 push r14 push r15 push #0x7d call #0x457a INT mov.b -0x4(r4), r15 sxt r15 add #0x8, sp pop r4 ret. Traduisons les en C.
SOCIAL ENGAGEMENT