hacking(287)
-
cryptohack.org - Structure of AES
보호되어 있는 글입니다.
2021.08.06 -
pwnable.xyz - Game
int __cdecl __noreturn main(int argc, const char **argv, const char **envp) { int v3; // eax setup(argc, argv, envp); puts("Shell we play a game?"); init_game(); while ( 1 ) { while ( 1 ) { print_menu(); printf("> "); v3 = read_int32(); if ( v3 != 1 ) break; (*(cur + 3))(); } if ( v3 > 1 ) { if ( v3 == 2 ) { save_game(); } else { if ( v3 != 3 ) goto LABEL_13; edit_name(); } } else { if ( !v3 ) e..
2021.08.05 -
cryptohack.org - Network Attacks
#!/usr/bin/env python3 import telnetlib import json HOST = "socket.cryptohack.org" PORT = 11112 tn = telnetlib.Telnet(HOST, PORT) def readline(): return tn.read_until(b"\n") def json_recv(): line = readline() return json.loads(line.decode()) def json_send(hsh): request = json.dumps(hsh).encode() tn.write(request) print(readline()) print(readline()) print(readline()) print(readline()) request = {..
2021.08.03 -
pwnable.xyz - GrownUp
// local variable allocation has failed, the output may be wrong! int __cdecl main(int argc, const char **argv, const char **envp) { char *src; // ST08_8 __int64 buf; // [rsp+10h] [rbp-20h] __int64 v6; // [rsp+18h] [rbp-18h] unsigned __int64 v7; // [rsp+28h] [rbp-8h] v7 = __readfsqword(0x28u); setup(*&argc, argv, envp); buf = 0LL; v6 = 0LL; printf("Are you 18 years or older? [y/N]: "); *(&buf + ..
2021.08.02 -
cryptohack.org - Modular Inverting
보호되어 있는 글입니다.
2021.08.02 -
pwnable.xyz - two targets
int __cdecl __noreturn main(int argc, const char **argv, const char **envp) { int input; // eax char name[32]; // [rsp+10h] [rbp-40h] BYREF _QWORD v5[4]; // [rsp+30h] [rbp-20h] BYREF v5[3] = __readfsqword(0x28u); setup(argc, argv, envp); memset(name, 0, 0x38uLL); while ( 1 ) { while ( 1 ) { print_menu(); input = read_int32(); // read 1~4 if ( input != 2 ) break; printf("nationality: "); scanf_("..
2021.08.01