Goto-zero: An extended intro to solving stack overflow CTF challenges
Skull Security
by ron
3M ago
Hey all! My husband’s company recently did an internal (commercial) CTF, and as a CTF nerd I got suckered into helping him. I thought one of the challenges had a pretty interesting solution - at least, something I hadn’t done before - and I thought I’d do a little write-up! Because it’s a commercial CTF, I wrote my own vulnerability binary, which you can grab here. It’s much, much simpler, but has all the components I wanted. They also provided libc.so, but since I’m not actually running the challenge, you can just use your own copy. (Note that I’m running the BSidesSF CTF again this spring, a ..read more
Visit website
BSidesSF 2024 Writeups: Turing Complete (Reversing / exploitation)
Skull Security
by ron
3M ago
This is a write-up for turing-complete, turing-incomplete, and turing-incomplete64 from the BSides San Francisco 2024 CTF! turing-complete is a 101-level reversing challenge, and turing-incomplete is a much more difficult exploitation challenge with a very similar structure. turing-incomplete64 is a 64-bit version of turing-incomplete, which isn’t necessarily harder, but is different. Let’s look at the levels ..read more
Visit website
BSidesSF 2024 Writeups: Slay the Spider (A hard heap-overflow)
Skull Security
by ron
3M ago
Slay the Spider is a Minesweeper-like game where the user and computer try to uncover a spider. The challenge name and trappings are based on Slay the Spire, which is one of my favourite games ..read more
Visit website
BSidesSF 2024 Writeups: Safer Streets (Web / reversing)
Skull Security
by ron
3M ago
This is a write-up for Safer Streets. I apparently wrote this in more “note to self” style, not blog style, so enjoy ..read more
Visit website
BSidesSF 2024 Writeups: No Tools (A puzzling Bash challenge)
Skull Security
by ron
3M ago
No Tools is a fairly simple terminal challenge, something for new players to chew on. I suspect there are several different ways to solve it, but the basic idea is to read a file using only built-in functions from sh ..read more
Visit website
BSidesSF 2024 Writeups: Can’t Give In (CGI exploitation)
Skull Security
by ron
3M ago
The premise of the three challenges cant-give-in, cant-give-in-secure, and cant-give-in-securer are to learn how to exploit and debug compiled code that’s loaded as a CGI module. You might think that’s unlikely, but a surprising number of enterprise applications (usually hardware stuff - firewalls, network “security” appliances, stuff like that) is powered by CGI scripts. You never know! This challenge was inspired by one of my co-workers at GreyNoise asking how to debug a CGI script. I thought it’d be cool to make a multi-challenge series in case others didn’t know! This write-up is intended ..read more
Visit website
BSidesSF 2024 Writeups: Turing Complete (Reversing / exploitation)
Skull Security
by ron
11M ago
This is a write-up for turing-complete, turing-incomplete, and turing-incomplete64 from the BSides San Francisco 2024 CTF! turing-complete is a 101-level reversing challenge, and turing-incomplete is a much more difficult exploitation challenge with a very similar structure. turing-incomplete64 is a 64-bit version of turing-incomplete, which isn’t necessarily harder, but is different. Let’s look at the levels! turing-complete My ideas doc said “Turing Machine?” from a long time ago. I don’t really remember what I was thinking, but what I decided was to make a simple reversing challenge with a ..read more
Visit website
BSidesSF 2024 Writeups: Slay the Spider (A hard heap-overflow)
Skull Security
by ron
11M ago
Slay the Spider is a Minesweeper-like game where the user and computer try to uncover a spider. The challenge name and trappings are based on Slay the Spire, which is one of my favourite games. When you start the game, there are several different enemy AI options: 1: The Angry One - Plays at Random 2: Cheater Mc Cheaterly - Knows the best places to play 3: Smartypants - Uses magical super AI for the best chance of winning 4: Captain Fastidious - Is sure that playing left to right is best Those are loosely based on the classes from Slay the Spire. The third - Smarypants - is the key. It choo ..read more
Visit website
BSidesSF 2024 Writeups: No Tools (A puzzling Bash challenge)
Skull Security
by ron
11M ago
No Tools is a fairly simple terminal challenge, something for new players to chew on. I suspect there are several different ways to solve it, but the basic idea is to read a file using only built-in functions from sh. I personally solved it with the read built-in: $ read FLAG < /home/ctf/flag.txt && echo $FLAG CTF{where-are-my-tools} Another solution that my co-organizer developed used exec: $ exec < /home/ctf/flag.txt $ /bin/sh: 2: CTF{where-are-my-tools}: not found ..read more
Visit website
BSidesSF 2024 Writeups: Can’t Give In (CGI exploitation)
Skull Security
by ron
11M ago
The premise of the three challenges cant-give-in, cant-give-in-secure, and cant-give-in-securer are to learn how to exploit and debug compiled code that’s loaded as a CGI module. You might think that’s unlikely, but a surprising number of enterprise applications (usually hardware stuff - firewalls, network “security” appliances, stuff like that) is powered by CGI scripts. You never know! This challenge was inspired by one of my co-workers at GreyNoise asking how to debug a CGI script. I thought it’d be cool to make a multi-challenge series in case others didn’t know! This write-up is intended ..read more
Visit website

Follow Skull Security on FeedSpot

Continue with Google
Continue with Apple
OR