category: writeups

Hack-A-Sat 2022: Power Level

22 May 2022 - 3 minutes
What does the scouter say about their power level?

Hack-A-Sat 2022: Small Hashes Anyways

22 May 2022 - 3 minutes
Micro hashes for micro blaze

CSAW 2021: A Different Type of Serial Key

12 Sep 2021 - 6 minutes
Attached are serial captures of two different uploads to an embedded device.

CSAW 2021: ncore

12 Sep 2021 - 5 minutes
We have a very safe core with a very safe enclave.

CSAW 2021: Tripping Breakers

12 Sep 2021 - 5 minutes
Attached is a forensics capture of an HMI (human machine interface) containing scheduled tasks, registry hives, and user profile of an operator account.

Hack-A-Sat 2021: Fiddlin' John Carson

30 Jun 2021 - 2 minutes
Where do you come from?

Hack-A-Sat 2021: Tree in the Forest

30 Jun 2021 - 4 minutes
Tree in the forest

Perfect Blue CTF 2020: Amazing ROP

7 Dec 2020 - 7 minutes
Should be a baby ROP challenge. Just need to follow directions and get first flag.

Flare-On CTF 2020 Challenge 9: crackinstaller

11 Nov 2020 - 6 minutes
What kind of crackme doesn’t even ask for the password? We need to work on our COMmunication skills.

Flare-On CTF 2020 Challenge 8: Aardvark

25 Sep 2020 - 1 minutes
Expect difficulty running this one. I suggest investigating why each error is occuring. Or not, whatever. You do you.

Flare-On CTF 2020 Challenge 7: re_crowd

24 Sep 2020 - 4 minutes
Here at Reynholm Industries we pride ourselves on everything. It’s not easy to admit, but recently one of our most valuable servers was breached. We don’t believe in host monitoring so all we have is a network packet capture. We need you to investigate and determine what data was extracted from the server, if any.

Flare-On CTF 2020 Challenge 6: codeit

23 Sep 2020 - 8 minutes
Reverse engineer this little compiled script to figure out what you need to do to make it give you the flag (as a QR code).

Flare-On CTF 2020 Challenge 5: TKApp

22 Sep 2020 - 5 minutes
This is the mobile device challenge for 2020 and features a pedometer app for the Tizen operating system.

Flare-On CTF 2020 Challenge 4: report

21 Sep 2020 - 5 minutes
Nobody likes analysing infected documents, but it pays the bills. Reverse this macro thrill-ride to discover how to get it to show you the key.

Flare-On CTF 2020 Challenge 3: wednesday

20 Sep 2020 - 2 minutes
Unlike challenge 1, you probably won’t be able to beat this game the old fashioned way.

Flare-On CTF 2020 Challenge 2: garbage

19 Sep 2020 - 2 minutes
One of our team members developed a Flare-On challenge but accidentally deleted it. We recovered it using extreme digital forensic techniques but it seems to be corrupted.

Flare-On CTF 2020 Challenge 1: Fidler

18 Sep 2020 - 2 minutes
This is a simple game. Win it by any means necessary and the victory screen will reveal the flag.

Hack-A-Sat 2020: Sun? On my Sat?

5 Jun 2020 - 8 minutes
We’ve uncovered a strange device listening on a port I’ve connected you to on our satellite. At one point one of our engineers captured the firmware from it but says he saw it get patched recently. We’ve tried to communicate with it a couple times, and it seems to expect a hex-encoded string of bytes, but all it has ever sent back is complaints about cookies, or something. See if you can pull any valuable information from the device and the cookies we bought to bribe the device are yours!

Cyberstakes CTF 2020: Assembly Voyageur

3 May 2020 - 6 minutes
The webpage for this challenge contains five textareas, each holding a snippet of assembly code for a different architecture.

Cyberstakes CTF 2020: Into the Metaverse

3 May 2020 - 8 minutes
We extracted the DRM module from a target device but haven’t been able to reverse engineer its validation logic.

Cyberstakes CTF 2020: National Dex #65

3 May 2020 - 2 minutes
We found the encryptor but it won’t decrypt encrypted?

Cyberstakes CTF 2020: Say What?

3 May 2020 - 8 minutes
We intercepted some foreign documents. We think there’s interesting information inside but the file is protected with a unique password algorithm

Plaid CTF 2020: golf.so

20 Apr 2020 - 7 minutes
Upload a 64-bit ELF shared object of size at most 1024 bytes. It should spawn a shell when loaded using LD_PRELOAD

Cyberstakes CTF 2018: Protocol

30 Nov 2018 - 5 minutes
We are provided with a server that implements a custom protocol and a packet capture of the protocol being used.

DEFCON CTF Quals 2018: ELF Crumble

18 May 2018 - 3 minutes
For this challenge we start off with a program which is aptly named broken as it segfaults when run.