RCtf 17 – easy_re

It has been a long time since R3x got a chance to play a CTF. He was pretty busy with a project that he was doing – A software implementation of an MMU. Well since RCTF happened during his exams he wasn’t able to try many challenges. easy_re On running the file command on the […]

Nullcon 17 – Breeze

R3x solved this challenge 7 minutes after the contest ended. Ya.. SEVEN MINUTES. Well after solving the EasyPeasy challenge R3x felt as if He got some insight into the author. The challenge turned out to be a simple but obfuscated infix to postfix converter. Well, It mostly involved going through the code. Well,. this code […]

Nullcon 17 – EasyPeasy

Ah the Nullcon CTF just got over. R3x managed to solve 2 RE challenges. Unfortunately, due to his Exams, he was unable to post the writeups earlier. Here is how he managed to solve EasyPeasy The name of the challenge is taking it too far, it was not so easy peasy. The challenge involved Recursive […]

InsomniHack ’17 – Cryptoquizz

It was the First CTF of the year 2017 , Team Bi0s was ready and so was R3x. The Team finished 34th Globally and 1st in India. The python script R3x used for getting the flag was: R3x used the Telnet module to connect to the address and a dictionary to store the names and […]

Cryptography: A shift in opinion

R3x had viewed cryptography as muddled numbers, people messing with numbers and creating weird equations, well it turns out that now he feels he was wrong. A few sessions R3x attended at the Amrita Centre for Cyber Security at Ettimadai made him realise that he had felt the same due to a lack of the […]

IceCTF 2016 – Drumpf Binary

Binary overview:-      The Binary has facility to book a suite, book  a room , delete booking and to print booking. The Aim is to change the flow of control to the flag function which obviously prints the flag. The program is protected by Canary, NX and RELRO is partially enabled. The program employs […]

Hack The Vote 2016: Consul (Rev 100)

The program doesn’t do much other than printing “Poor Bernie”. But when we open the file in IDA or Gdb we find that there are lot of functions which are not called anywhere in the program. So we understand that we need to excecute the functions by changing the eip of the program. This is […]