by digitaloperatives | Jan 21, 2014 | Capture the Flag
We had a great time solving a few problems from the Ghost in the Shellcode CTF this past weekend and wanted to have an easy place with links to write-ups from all around the Internet, so we created it here. If you know of a link we have missed, please let...
by digitaloperatives | Jan 20, 2014 | Research
A couple days ago, Dominic Spill and Michael Ossman presented an interesting talk at Shmoocon on using specially crafted error correcting codes to have unambiguous encapsulation, preventing attacks like “Packet in Packet.” This appears to be the...
by digitaloperatives | Jan 19, 2014 | Capture the Flag
The video contains a second audio stream, as indicated by VLC here: The second audio stream is an SSTV stream containing image information. We extract the stream with the following command (the same file as the download was “credits.ogv” in the...
by digitaloperatives | Jan 19, 2014 | Capture the Flag
We are given the hint “Solveable in <5m. Much attack very wamerican-small.” The file begins with “VimCrypt~01!” and research on vim’s encryption method reveals that this means the file has been encrypted with the Unix crypt function....
by digitaloperatives | Jan 19, 2014 | Capture the Flag
Viewing the file with whitespace visible in vim shows that there are strange combinations of tabs and spaces at the end of each line. Assuming there’s more to whitespace than meets the eye, we search for all non-whitespace characters: …and remove them. We...