c0derpwner@home:~$

  • Huntress_Tickler_3

    Initial Analysis The challenge provides a Rust binary for analysis. Opening the binary in IDA Free and decompiling it reveals the typical Rust structure with a main function. Upon dynamic execution of the binary, the user is presented with the following prompt: What is my favorite sha256 hash? Since this...

  • Huntress_No_limits

    This challenge presents a sandboxed Linux binary that allows dynamic memory allocation and execution of user-supplied shellcode. A seccomp filter is used to restrict certain syscalls, and Address Space Layout Randomization (ASLR) is enabled. The goal is to read and print the contents of /flag.txt without traditional command execution. The...

  • Web - JS Safe 6.0 - GoogleCTF

    Challenge description: You stumbled upon someone’s “JS Safe” on the web. It’s a simple HTML file that can store secrets in the browser’s localStorage. This means that you won’t be able to extract any secret from it (the secrets are on the computer of the owner), but it looks like...