mephi42: (Default)
Convince rms.hackable.software:1337 (binary) to download http://127.0.0.1:8000/flag

Read more... )
mephi42: (Default)
Given an on-screen keyboard and a Nintendo Switch Pro Controller USB traffic capture in pcapng format, determine what was typed.

Read more... )
mephi42: (Default)
Caught flu and staying at home, drinking gallons of warm tea. The fever is thankfully gone (but not cough, goddamnit!), so this is a good opportunity to do whatever I want, which in this case is solving some CTF tasks.

Let's give the "Looking glass" from Teaser Dragon CTF 2019 a try. The CTF is over, but who cares - the services are still running. The objective is to read the /flag file from the server on which http://lg.hackable.software:8080/ is running. The sources are available.

Read more... )

Profile

mephi42: (Default)
mephi42

September 2019

S M T W T F S
1234567
891011121314
15161718192021
22232425 262728
2930     

Syndicate

RSS Atom

Style Credit

Expand Cut Tags

No cut tags
Page generated Jun. 2nd, 2025 11:04 pm
Powered by Dreamwidth Studios