TL;DR
basic buffer overflows
overwriting return addies 2 wiin
1. what are we working with?
64‑bit ELF (ET_EXEC), NX enabled, no PIE ⇒ every address is static
Three hidden flag functions in .text:
win1() → prints flag1.txt (no args)
win2(arg) → prints DEADBEEF.txt (needs one 64‑bit arg)...
TL;DR
0x100byte blob -> lookup table -> SBOX
additive key stream, decoding = inverse tble + modular substraction
1. i skimmed the instructions and found an instereting loop
2. right be4 the loop a counter and starting key was inited
3. identified how key is being transformed
wrapping...
TL;DR
Running the 64‑bit ELF prints only four innocuous lines. In the disassembler you immediately notice ~20 consecutive mov …, imm64 instructions that fill a 160‑byte stack buffers before the first puts.
That buffer holds the obfuscated flag.
1. Create an array of 20 Qwords at that address...
Ye sup sup,
It got hella annoying manually managing multiple nginx server blocks etc. so i created a lil dynamic host reverse proxy abusing docker, its networking, nginx and openresty. Currently all hard coded, only some sqli/xss detection and combination with cloudflare required. Will extend...
Howdy folks, 0x90 here, your friendly neighborhood CISO and occasional bug bounty hunter. Over the past few months, I’ve been on a cyber-adventure through the world of Swiss software giants. And let me tell you, what I found lurking behind their pristine veneers was enough to make even the...
Introduction
Creating a robust usermode anti-cheat for the HorizonMW project has been one of the most challenging yet rewarding experiences I've undertaken. Without kernel access, the task became exponentially more complex, as many conventional cheat detection mechanisms rely heavily on...
Howdy mr skid,
If you thought you can learn game hacking to get an unfair advantage, this is not the right blogpost for you. If you are genuinly interested in getting a more in depth insight into the art of game hacking and defending alias anti cheating, then you can buckle up, since your are...
Introduction
During the solving of my OSCP labs I had alot of repetitive tasks, like enumarating web applications. In addition i have realized that many web applications have thousands of pages and enumarrating all of them ist just not feasible. In addition many tools I have used were just not...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.