Home

TG:HACK 2020 – s2s messaging Writeup

Intercepted ship to ship communication. Can you find the message? This challenge also gives us a pcapng file. Pcapng are generated by Wireshark and contain a history of packets sent and received by computers. So, let’s start Wireshark to analyze the file. We go to Statistics -> Conversations and then we select the TCP tab to list all TCP ...

Read more

Satisfactory TI-84 Plus Programs

A few days ago, I decided to create some programs that are good to spend time. Some of them make you relax and others make you even more stressful. Anyway, I will share some of them with you. Graphic Reverser The objective of this program is to reverse all the pixels in the graphic area. To achieve this, we will need to implement a loop that ...

Read more

Juni0r Dashboard Writeup

For this challenge we are only given this link: http://ctf1.epizy.com By navigating to the page and analysing its source we find a comment with the challenge instructions. So, we must find a way to log in into Juni0r Dashboard. Juni0r also gives us a clue: PS: I hope Google won’t index this page… Probably the site has a robots.txt fi...

Read more

HackPack CTF – Time Window Writeup

The evil server admin has a secret but will only give it to you if you can guess his coveted hidden value, but it keeps changing with time: https://timed-key.cha.hackpack.club By analyzing the source of the web page we see that there are two JS files linked to it. <script src="_sr_.js"></script> <script src="__.js"></scri...

Read more

Checking TI-84 Plus Battery Status

In this tutorial, I am going to create a program that will automatically check your battery status and retrieve this value to you. To achieve this result, you will need to create two programs, one written to be executed directly into the calculator processor and another written in TI-BASIC. Retrieving battery status First, create a program ca...

Read more

AUCTF 2020 – Mental Writeup

Password Format: Color-Country-Fruit Hash: 17fbf5b2585f6aab45023af5f5250ac3 By analyzing the information provided we realized that the hash is probably a MD5 one because it is 32 characters long and hex-encoded. Using hash-identifier on Kali Linux returns the same result: The first thing we tried was a rainbow table attack where we comp...

Read more

AUCTF 2020 – Block 2 Writeup

Billy runs a minecraft server. He wants to know which block was rolled back. Can you help him? The challenge also provided an archive called co_block.sql.gz The first step is extracting the files from the gz file. We can see that there was just one file compressed, called co_block.sql We can analyse the first lines of the file using head co...

Read more

See Incognito Browsing History

In contrast to what most people think, seeing the history from an incognito session is not impossible. Actually, it is quite easy if you do it the right way. In this post I will show you some methods to achieve this goal, some that require software and one that you can do right now. With software For this section I will write some Python scrip...

Read more