CTF

DeadSec CTF 2024 – Mic check

This is a small write-up of the “Mic check” challenge from DeadSec CTF 2024 (Misc Category). The difficulty was easy and it was a kind of stuff that appears often in CTF challenges. Description : mic is it ok?mic is it ok? A link is to start a docker container and the command to connect […]

DeadSec CTF 2024 – Mic check Read More »

SEETF 2022 – Sniffed Traffic

This is a small write-up of the “Sniffed Traffic” challenge from SEECTF 2022 (Forensics Category). Description : Author: EnyeiWe inspected our logs and found someone downloading a file from a machine within the same network.Can you help find out what the contents of the file are?For beginners: https://www.javatpoint.com/wiresharkMD5: 71cd3bdbecece8d7919b586959f2d3b7 Solution : Once the capture file

SEETF 2022 – Sniffed Traffic Read More »

picoCTF 2022 – Torrent Analyze

This is a small write-up of the “Torrent Analyze” challenge from picoCTF 2022 (Forensics Category). The challenge is now available in picoGym here ! Description : SOS, someone is torrenting on our network. One of your colleagues has been using torrent to download some files on the company’s network. Can you identify the file(s) that

picoCTF 2022 – Torrent Analyze Read More »

picoCTF 2022 – x-sixty-what

This is a small write-up of the “x-sixty-what” challenge from picoCTF 2022 (Binary Exploitation Category). The challenge is now available in picoGym here ! Description : Overflow x64 code Most problems before this are 32-bit x86. Now we’ll consider 64-bit x86 which is a little different! Overflow the buffer and change the return address to

picoCTF 2022 – x-sixty-what Read More »