by digitaloperatives | Jan 19, 2014 | Capture the Flag
We are given the hint “Solveable in <5m. Much attack very wamerican-small.” The file begins with “VimCrypt~01!” and research on vim’s encryption method reveals that this means the file has been encrypted with the Unix crypt function....
by digitaloperatives | Jan 19, 2014 | Capture the Flag
Viewing the file with whitespace visible in vim shows that there are strange combinations of tabs and spaces at the end of each line. Assuming there’s more to whitespace than meets the eye, we search for all non-whitespace characters: …and remove them. We...
by digitaloperatives | Nov 27, 2013 | Research
Those who have “reversed” .NET libraries would probably argue that you’re not really reversing a binary if it contains full type information. Commercial software developers and malware authors would make a similar claim and are therefore compelled to...
by digitaloperatives | Oct 10, 2013 | Services
Successful hackers must continuously learn and adapt to ever-evolving and multi-faceted challenges presented by a changing technology landscape. Hacking and computer security courses are traditionally offered at hacking conferences and individuals must fly early to...
by digitaloperatives | Sep 25, 2013 | Capture the Flag
Each year, the Information Systems and Security Laboratory (ISIS Lab) of the Polytechnic Institute of New York University hosts a Cyber Security Awareness Week, bringing together students and researchers to discuss the latest in cybersecurity. Cybersecurity...