Skip to content

Commit

Permalink
たくさん
Browse files Browse the repository at this point in the history
  • Loading branch information
N4NU committed Feb 20, 2018
1 parent 24de47f commit d162250
Show file tree
Hide file tree
Showing 63 changed files with 867 additions and 33 deletions.
1 change: 1 addition & 0 deletions .gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
TODO/
Binary file not shown.
13 changes: 13 additions & 0 deletions Baby/Internetwache_CTF_2016_File_Checker/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# Internetwache CTF 2016 : File Checker

- Points : 60
- Solves : 190
- Description :
```
Description: My friend sent me this file. He told that if I manage to reverse it, I'll have access to all his devices. My misfortune that I don't know anything about reversing :/
Attachment: rev60.zip
```

## [attachment](File_Checker.7z)

## [Write up](writeup.md)
10 changes: 10 additions & 0 deletions Baby/Internetwache_CTF_2016_File_Checker/writeup.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
# Write up (Internetwache CTF 2016 : File Checker)

flag : `IW{FILE_CHeCKa}`

## 一言Write up
1文字ずつ評価して評価結果が全て0の時の入力がflag

## Write up


12 changes: 12 additions & 0 deletions Baby/Internetwache_CTF_2016_SPIM/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
# Internetwache CTF 2016 : SPIM

- Points : 50
- Solves : 208
- Description :
```
Description: My friend keeps telling me, that real hackers speak assembly fluently. Are you a real hacker? Decode this string: "IVyN5U3X)ZUMYCs"
```

## [attachment](SPIM.7z)

## [Write up](writeup.md)
Binary file added Baby/Internetwache_CTF_2016_SPIM/SPIM.7z
Binary file not shown.
9 changes: 9 additions & 0 deletions Baby/Internetwache_CTF_2016_SPIM/writeup.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
# Write up (Internetwache CTF 2016 : SPIM)

flag : `IW{M1P5_!S_FUN}`

## 一言Write up
MIPSのアセンブリを読む.文字列の文字をそれぞれのindexとxorしてる.

## Write up

13 changes: 13 additions & 0 deletions Baby/Internetwache_CTF_2016_ServerfARM/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# Internetwache CTF 2016 : ServerfARM

- Points : 70
- Solves : 156
- Description :
```
Description: Someone handed me this and told me that to pass the exam, I have to extract a secret string. I know cheating is bad, but once does not count. So are you willing to help me?
Attachment: rev70.zip
```

## [attachment](ServerfARM.7z)

## [Write up](writeup.md)
Binary file not shown.
10 changes: 10 additions & 0 deletions Baby/Internetwache_CTF_2016_ServerfARM/writeup.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
# Write up (Internetwache CTF 2016 : ServerfARM)

flag : `IW{S.E.R.V.E.R>=F:A:R:M}`

## 一言Write up
flagが3つのブロックに分離されて入力のverifyの結果,正しい場合に標準出力に出力される

## Write up


Binary file not shown.
19 changes: 19 additions & 0 deletions Baby/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_1/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
# Nuit du Hack CTF Quals 2016 : Matriochka - Step 1

- Points : 50
- Solves : 432
- Description :
```
Can you help me?
Recently, I found an executable binary.
As I'm a true newbie,
Certainly, to solve it, I will have difficulties.
Keep in mind, the first step is quite easy.
Maybe the last one will be quite tricky.
Emulating it could be a good idea.
The challenge is available at : http://static.quals.nuitduhack.com/stage1.bin
```

## [attachment](Matriochka_-_Step_1.7z)

## [Write up](writeup.md)
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
# Write up (Nuit du Hack CTF Quals 2016 : Matriochka - Step 1)

flag : `Much_secure__So_safe__Wow`

## 一言Write up
そのままのkeyと入力をstrcmpで比較している.

## Write up

Binary file not shown.
19 changes: 19 additions & 0 deletions Baby/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_2/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
# Nuit du Hack CTF Quals 2016 : Matriochka - Step 2

- Points : 100
- Solves : 232
- Description :
```
Can you help me?
Recently, I found an executable binary.
As I'm a true newbie,
Certainly, to solve it, I will have difficulties.
Keep in mind, the first step is quite easy.
Maybe the last one will be quite tricky.
Emulating it could be a good idea.
You must solve step 1 first.
```

## [attachment](Matriochka_-_Step_2.7z)

## [Write up](writeup.md)
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
# Write up (Nuit du Hack CTF Quals 2016 : Matriochka - Step 2)

flag : `Pandi_panda`

## 一言Write up
入力を四則演算でverifyしている.

## Write up

Binary file not shown.
18 changes: 18 additions & 0 deletions Baby/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_3/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
# Nuit du Hack CTF Quals 2016 : Matriochka - Step 3

- Points : 300
- Solves : 185
- Description :
```
Recently, I found an executable binary.
As I'm a true newbie,
Certainly, to solve it, I will have difficulties.
Keep in mind, the first step is quite easy.
Maybe the last one will be quite tricky.
Emulating it could be a good idea.
You must solve steps 1 and 2 first.
```

## [attachment](Matriochka_-_Step_3.7z)

## [Write up](writeup.md)
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
# Write up (Nuit du Hack CTF Quals 2016 : Matriochka - Step 3)

flag : `Did_you_like_signals?`

## 一言Write up
SignalのHandlerがChainして複数の関数で1文字ずつ入力をverifyしている

## Write up

Binary file not shown.
13 changes: 13 additions & 0 deletions Baby/Sharif_University_CTF_2016_Android_App/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# Sharif University CTF 2016 : Android App

- Points : 100
- Solves : 58
- Description :
```
Find the Flag!!
Download Sharif_CTF.apk
```

## [attachment](Android_App.7z)

## [Write up](writeup.md)
10 changes: 10 additions & 0 deletions Baby/Sharif_University_CTF_2016_Android_App/writeup.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
# Write up (Sharif University CTF 2016 : Android App)

flag : `Sharif_CTF{833489ef285e6fa80690099efc5d9c9d}`

## 一言Write up
MainActivityがlibadnjni.soをロードし,processObjectArrayFromNativeをインポートしている.
processObjectArrayFromNativeでハードコーディングされた文字列と比較している.

## Write up

14 changes: 14 additions & 0 deletions Baby/Sharif_University_CTF_2016_SRM/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
# Sharif University CTF 2016 : SRM

- Points : 50
- Solves : 173
- Description :
```
The flag is : The valid serial number
Download RM.exe
```

## [attachment](SRM.7z)

## [Write up](writeup.md)
Binary file added Baby/Sharif_University_CTF_2016_SRM/SRM.7z
Binary file not shown.
9 changes: 9 additions & 0 deletions Baby/Sharif_University_CTF_2016_SRM/writeup.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
# Write up (Sharif University CTF 2016 : SRM)

flag : `CZ9dmq4c8g9G7bAX`

## 一言Write up
Emailは適当なEmailを入力すれば良い.Serialは単純なasciiの比較とSerialのある要素と,ある要素の加算結果の比較などでverifyしている.

## Write up

14 changes: 14 additions & 0 deletions Baby/Sharif_University_CTF_2016_Serial/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
# Sharif University CTF 2016 : Serial

- Points : 150
- Solves : 108
- Description :
```
Run and capture the flag!
Download serial
```

## [attachment](Serial.7z)

## [Write up](writeup.md)
Binary file added Baby/Sharif_University_CTF_2016_Serial/Serial.7z
Binary file not shown.
9 changes: 9 additions & 0 deletions Baby/Sharif_University_CTF_2016_Serial/writeup.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
# Write up (Sharif University CTF 2016 : Serial)

flag : `EZ9dmq4c8g9G7bAV`

## 一言Write up
anti disassembleが適用されているが,verifyはSharif University CTF 2016 : SRMと同様.

## Write up

File renamed without changes.
File renamed without changes.
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
# Write up (Sharif University CTF 2016 : dMd)

flag : `grape`

## 一言Write up
入力のmd5を一文字ずつ比較するだけのバイナリ.md5の結果が分かるので[MD5 Decrypter](http://www.md5online.org)などで元に戻せばフラグが得られる.

## Write un
## Write up

12 changes: 12 additions & 0 deletions Easy/0CTF_2016_Quals_boomshakalaka/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
# 0CTF 2016 Quals : boomshakalaka

- Points : 3
- Solves : 35
- Description :
```
play the game, get the highest score
```

## [attachment](boomshakalaka.7z)

## [Write up](writeup.md)
Binary file not shown.
10 changes: 10 additions & 0 deletions Easy/0CTF_2016_Quals_boomshakalaka/writeup.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
# Write up (0CTF 2016 Quals : boomshakalaka)

flag : `0ctf{C0coS2d_AnDro1d_G0mE_YoU_Kn0w?}`

## 一言Write up
処理の間々でSharedPreferencesに文字列が書き加えられており,base64でデコードするとflagが得られる.

## Write up


12 changes: 12 additions & 0 deletions Easy/SSCTF_2016_Re1/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
# SSCTF 2016 : Re1

- Points : 100
- Solves : 83
- Description :
```
Null
```

## [attachment](Re1.7z)

## [Write up](writeup.md)
Binary file added Easy/SSCTF_2016_Re1/Re1.7z
Binary file not shown.
9 changes: 9 additions & 0 deletions Easy/SSCTF_2016_Re1/writeup.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
# Write up (SSCTF 2016 : Re1)

flag : `SSCTF{oty3eaP$g986iwhw32j%OJ)g0o7J.CG:}`

## 一言Write up

## Write up


12 changes: 12 additions & 0 deletions Medium_Easy/0CTF_2016_Quals_momo/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
# 0CTF 2016 Quals : momo

- Points : 3
- Solves : 31
- Description :
```
I think it's hard winning a war with words.
```

## [attachment](momo.7z)

## [Write up](writeup.md)
9 changes: 9 additions & 0 deletions Medium_Easy/0CTF_2016_Quals_momo/writeup.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
# Write up (0CTF 2016 Quals : momo)

flag : `0ctf{m0V_I5_tUr1N9_c0P1Et3!}`

## 一言Write up

## Write up


12 changes: 12 additions & 0 deletions Medium_Easy/Boston_Key_Party_CTF_2016_Jit_in_my_pants/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
# Boston Key Party CTF 2016 : Jit in my pants

- Points : 3
- Solves : 38
- Description :
```
Because reversing an obfuscated jit'ed virtual machine for 3 points is fun!
```

## [attachment](Jit_in_my_pants.7z)

## [Write up](writeup.md)
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
# Write up (Boston Key Party CTF 2016 : Jit in my pants)

flag : `BKPCTF{S1de_Ch4nnel_att4cks_are_s0_1338}`

## 一言Write up

## Write up


12 changes: 12 additions & 0 deletions Medium_Easy/PlaidCTF_2016_quick/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
# PlaidCTF 2016 : quick

- Points : 175
- Solves : 49
- Description :
```
Why be slow when you can be quick?
```

## [attachment](quick.7z)

## [Write up](writeup.md)
9 changes: 9 additions & 0 deletions Medium_Easy/PlaidCTF_2016_quick/writeup.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
# Write up (PlaidCTF 2016 : quick)

flag : `PCTF{5ur3_a5_5ur3_5w1ft_a5_5w1ft}`

## 一言Write up

## Write up


12 changes: 12 additions & 0 deletions Medium_Easy/SSCTF_2016_Quals_Re2/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
# SSCTF 2016 Quals : Re2

- Points : 200
- Solves : 53
- Description :
```
Do You Like Bad Apple
```

## [attachment](Re2.7z)

## [Write up](writeup.md)
9 changes: 9 additions & 0 deletions Medium_Easy/SSCTF_2016_Quals_Re2/writeup.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
# Write up (SSCTF 2016 Quals : Re2)

flag : `JZZZXZYP{8ZBIzPL0HPAFwdqZ{3ZXRad`

## 一言Write up

## Write up


Loading

0 comments on commit d162250

Please sign in to comment.