
2021/06/12 -
CTF
,
Reverse Engineering
For this challenge we can download a compiled C file called "crackme2_1.out". When I execute the file, a simple addition of 3 numbers, randomly generate, is required to ...
2021/06/12 -
CTF
,
Reverse Engineering
For this challenge we can download a compiled C file called "crackme2_1.out". When I execute the file, a simple addition of 3 numbers, randomly generate, is required to ...
For this challenge we can download an image called "zipper_1_.jpg". I immediately think that might be probably a steganography challenge (Art of hiding data in image).
2021/06/06 -
CTF
,
Reverse Engineering
For this challenge we can download a compiled C file called "crackme1_1.out". When I execute the file, a password seems to be required to retrieve the flag.
This new challenge is based on the re-code of the Pokemon battle interface. To get the flag we must catch all 150 pokemon. Problem, we only have 99 pokeball’s in our ...
On this challenge, the platform seems to be an e-commerce website. The homepage displays only 3 buttons (source code, e-shop and reset).