Hello everyone, I struggle a lot to think of good project ideas and then actually doing them until the end, in particular cyber security projects.…
# Information: CTF Name: ROP Emporium CTF Challenge: badchars Challenge Category: Binary Exploitation Challenge Points: N/A Level 5 ROP Emporium # Used Tools: Radare2 Gdb ROPgadget pwntools …
# Information: CTF Name: ROP Emporium CTF Challenge: write4 Challenge Category: Binary Exploitation Challenge Points: N/A Level 4 ROP Emporium # Used Tools: Radare2 Gdb ROPgadget pwntools …
# Information: CTF Name: ROP Emporium CTF Challenge: callme Challenge Category: Binary Exploitation Challenge Points: N/A Level 3 ROP Emporium # Used Tools: Radare2 Gdb ROPgadget pwntools …
# Information: CTF Name: ROP Emporium CTF Challenge: split Challenge Category: Binary Exploitation Challenge Points: N/A Level 2 ROP Emporium # Used Tools: Radare2 Gdb …
# Information: CTF Name: ROP Emporium CTF Challenge: ret2win Challenge Category: Binary Exploitation Challenge Points: N/A Level 1 ROP Emporium # Used Tools: Radare2 Gdb ROPgadget pwntools …
# Information: CTF Name: PicoCTF CTF Challenge: WhitePages Challenge Category: Forensics Challenge Points: 250 PicoCTF 2019 # Challenge Description: I stopped using YellowPages and…
# Information: CTF Name: PicoCTF CTF Challenge: vault-door-4 Challenge Category: Reverse Engineering Challenge Points: 250 PicoCTF 2019. # Challenge Description: This vault uses ASCII encoding for…
In your hacking journey you might need to manipulate an HTTP request, either change the cookies, or the user-agent, or any other part of the…
# Information: CTF Name: PicoCTF CTF Challenge: asm2 Challenge Category: Reverse Engineering Challenge Points: 250 PicoCTF 2019. # Challenge Description: What does asm2(0xb,0x2e) return? Submit the…