Babiersteps📅 May 1, 2022 · ☕ 1 min readA classic ret2win challenge on a 64-bit binary, overflow RIP with win() address to get flag.
Babysteps📅 May 1, 2022 · ☕ 2 min readA classic ret2shellcode with a twist, we use a gadget to execute our code off the stack. binary is 32-bit.
Detour📅 May 1, 2022 · ☕ 3 min readA write-what-where scenario that enables us to overwrite the destructor (dtor) in the relocations table with our win() function to get a shell.
Dweeno📅 May 1, 2022 · ☕ 3 min readA hardware challenge where we're given some serial output from a Arduino and the corresponding wiring diagram and encryption source code.
Leaky Pipe - 0xL4ugh CTF📅 Jan 17, 2021 · ☕ 3 min readIn this challenge we recieved a binary in which we are asked to exploit and somehow retrieve the flag.
Trigger Happy - 0xL4ugh CTF📅 Jan 16, 2021 · ☕ 7 min readThis is a challenge from 0xl4ugh CTF which was inspired by RACTF's not really ai challenge.
Not Really AI - RA CTF📅 Jun 8, 2020 · ☕ 6 min readThis is a Binary exploitaion challenge, based around a format string vulnerability.