itoid

@itoid

part of https://sniteam.xyz/ and https://www.qnqsec.team/

Joined on Aug 27, 2023

  • Reconstruction chall-sc Decompile ELFnya int __fastcall __noreturn main(int argc, const char **argv, const char **envp) { int buf; // [rsp+3h] [rbp-Dh] BYREF char v4; // [rsp+7h] [rbp-9h] unsigned __int64 v5; // [rsp+8h] [rbp-8h]
     Like  Bookmark
  • Sanity Check chall-sc Free flag Flag: ARA6{apakah_kalian_akan_memasak_atau_dimasak?????} Simple Math chall-sc Given a disassembled Python bytecode and the output 0 0 RESUME 0
     Like  Bookmark
  • alphascii clashing chall-sc Diberikan server.py server.py #!/usr/bin/env python3 from hashlib import md5 import json
     Like  Bookmark
  • CryoWarmup chall-sc Diberikan ELF 64-bit, decompile ELFnya main int __fastcall main(int argc, const char **argv, const char **envp) { _BYTE v4[56]; // [rsp+0h] [rbp-40h] BYREF unsigned __int64 v5; // [rsp+38h] [rbp-8h]
     Like  Bookmark
  • All chall-sc Diberikan sebuah zip yang berisi Executable and Linkable Format (ELF) 64-bit beserta Docker Setup untuk mendeploy challengenya di server. Langsung saja kita decompile ELFnya. main int __fastcall main(int argc, const char **argv, const char **envp) { vuln(argc, argv, envp); return 0;
     Like  Bookmark
  • ezpz what if we went backwards..... really really fast.... by nop.so nc 165.227.103.166 6002 Diberikan sebuah Executable and Linkable Format (ELF) 64-bit. Langsung saja kita decompile. main int __cdecl main(int argc, const char **argv, const char **envp) {
     Like  Bookmark
  • Vault Can you get the access? Diberikan sebuah Executable and Linkable Format (ELF) 64-bit yang merupakan program flag checker. Langsung saja kita decompile. main int __cdecl main(int argc, const char **argv, const char **envp) { const char *v3; // rsi const char *v4; // rax
     Like  Bookmark
  • Given questions about integer overflows, we just need to answer them accordingly. from pwn import * exe = './test' elf = context.binary = ELF(exe, checksec = 0) context.bits = 64 context.log_level = 'debug' context.terminal = ["kitty", "@launch", "--location=split", "--cwd=current"] host, port = "nc 94.237.58.224 52022".split(" ")[1:3] io = remote(host, port)
     Like 2 Bookmark