by digitaloperatives | Oct 10, 2018 | Capture the Flag, Security News
On Monday we became a tenant at the shared office provider WeWork. According to their website, “WeWork is a global network of workspaces where companies and people grow together.” We needed something more flexible while our new corporate office is being...
by digitaloperatives | Feb 23, 2015 | Capture the Flag
We began with no hint, and the file ‘cloudfs-31c938df3531611b82fddf0685784a2b67373305ec689015f193a555b756beb2’. The command file tells us that it is compressed data. $ file cloudfs-31c938df3531611b82fddf0685784a2b67373305ec689015f193a555b756beb2...
by digitaloperatives | Sep 22, 2014 | Capture the Flag
The annual NYU Polytechnic School of Engineering Cyber Security Awareness Week (CSAW) Capture The Flag (CTF) competition online qualifiers were held September 19-21, 2014. This is a writeup of one of the Exploitation challenges we solved: "saturn". The...
by digitaloperatives | Jan 30, 2014 | Capture the Flag
We are given a file, “task.exe,” and told that “smthg wrong with this env.” Running `file` tells us that this is not an EXE at all: it is an x86_64 ELF. We try to run it and quickly determine it expects a certain command-line...
by digitaloperatives | Jan 29, 2014 | Capture the Flag
The description of the task is that the program has been stuck “in a blender.” Upon opening the program in IDA Pro, it is clear the bytes have been modified, since there are nonsensical instructions and a large block of undecipherable bytes. It is...
by digitaloperatives | Jan 28, 2014 | Capture the Flag
If you know of a link we have missed, please let us know in the comments and we will add it shortly. Thanks! Metal Gear Felix http://tasteless.se/2014/01/phd-ctf-quals-2014-rbox-and-metal-gear-felix-writeup/ mp3 me...