by digitaloperatives | Jan 28, 2014 | Capture the Flag
If you know of a link we have missed, please let us know in the comments and we will add it shortly. Thanks! Metal Gear Felix http://tasteless.se/2014/01/phd-ctf-quals-2014-rbox-and-metal-gear-felix-writeup/ mp3 me...
by digitaloperatives | Jan 24, 2014 | Services
Data security is paramount for any business, especially those entrusted with the intellectual property of others. Today’s cyber threats are only growing more sophisticated, and keeping your business secure is correspondingly ever more complex. ...
by digitaloperatives | Jan 21, 2014 | Capture the Flag
We had a great time solving a few problems from the Ghost in the Shellcode CTF this past weekend and wanted to have an easy place with links to write-ups from all around the Internet, so we created it here. If you know of a link we have missed, please let...
by digitaloperatives | Jan 20, 2014 | Research
A couple days ago, Dominic Spill and Michael Ossman presented an interesting talk at Shmoocon on using specially crafted error correcting codes to have unambiguous encapsulation, preventing attacks like “Packet in Packet.” This appears to be the...
by digitaloperatives | Jan 19, 2014 | Capture the Flag
The video contains a second audio stream, as indicated by VLC here: The second audio stream is an SSTV stream containing image information. We extract the stream with the following command (the same file as the download was “credits.ogv” in the...
by digitaloperatives | Jan 19, 2014 | Capture the Flag
We are given the hint “Solveable in <5m. Much attack very wamerican-small.” The file begins with “VimCrypt~01!” and research on vim’s encryption method reveals that this means the file has been encrypted with the Unix crypt function....
by digitaloperatives | Jan 19, 2014 | Capture the Flag
Viewing the file with whitespace visible in vim shows that there are strange combinations of tabs and spaces at the end of each line. Assuming there’s more to whitespace than meets the eye, we search for all non-whitespace characters: …and remove them. We...
by digitaloperatives | Nov 27, 2013 | Research
Those who have “reversed” .NET libraries would probably argue that you’re not really reversing a binary if it contains full type information. Commercial software developers and malware authors would make a similar claim and are therefore compelled to...
by Nate | Nov 8, 2013 | Uncategorized
For two years now, Digital Operatives has hosted some systems on Verizon FiOS. Largely it has been trouble-free. That is, until about a week ago. About a week ago, two employees (eventually three) described an issue they were having connecting to our mail server and...
by digitaloperatives | Oct 10, 2013 | Services
Successful hackers must continuously learn and adapt to ever-evolving and multi-faceted challenges presented by a changing technology landscape. Hacking and computer security courses are traditionally offered at hacking conferences and individuals must fly early to...