PWN - ROP (Deadface CTF 2025)
I will make a slight change on how the article will be. Instead of one CTF per article, I will make one challenge per article. This will ensure to ease my future writeup reference Locked OutPoints: 100 Created By: @SpiffyLich Desc:We found this program on one of the old drives DEADFACE threw out. We think they’re using it on a server somewhere as a way for members to ‘log in…’ and to keep other people out. No password seems to work. Looking it over, it seems vulnerable enough— but how on...
Nowruz-1404
Nowruz 1404Nowruz 1404 is an online jeopardy-style Capture The Flag competition organized by the FlagMotori team.I played this ctf under RE:UN10N team and got 10th place. This writeup will cover the crypto challenges only. CryptoBrutal RSAQuestion: Sometimes you need to be cruel to be able to solve a crypto challenge, don’t you? Wrap the decrypted message in: FMCTF{} output.txt: 123c = ...
ApoorvCTF
We played ApoorvCTF Cryptokowareta cipherTHe question is about AES-ECB Plaintext Recovery. It is a cryptographic attack that exploits the weaknesses of the ECB mode. In ECB mode, identical plaintext blocks are encrypted into identical ciphertext blocks, making it vulnerable to pattern recognition and chosen-plaintext attacks. Chall.py12345678910111213141516171819202122232425262728293031323334353637import sysfrom Crypto.Cipher import AESfrom Crypto.Util.Padding import padfrom random import...
WargamesMY 2024
WargamesMY 2024Writeup for the challenges that I solved in Wargames.MY 2024This is my first time participating in WMGY and we solved some solvable challenges. MiscChristmas GIFtHere is your christmas GIFt from santa! Just open and wait for it.. SolutionThe solution is really like the description, Just open and wait for it..Opened it in stegsolve and the flag is on frame 1402 DCM Meta“[25, 10, 0, 3, 17, 19, 23, 27, 4, 13, 20, 8, 24, 21, 31, 15, 7, 29, 6, 1, 9, 30, 22, 5, 28, 18, 26, 11, 2,...
CryptoHack
RSARSA Signature The private keys are 12N =...





