Posts

Tokyo Westerns CTF 2020 - writeups.

Image
[*]-challenges     [+] (Rev - 126 pts) Reversing iS Amazing     [+] (Rev - 224 pts) Tamarin Our Team Invaders ended up at 21th position in `Tokyo Westerns CTF 2020` conducted by ` TokyoWesterns team `. [Rev] Reversing iS Amazing It is a warmup chall, Given a rsa file, a 64 bit executable. Decompiled the executable with ghidra. As the binary is dynamically linked, we still have the external library function calls. BIO_new_mem_buf d2i_PrivateKey_bio EVP_PKEY_get1_RSA RSA_private_encrypt Those are openssl library API calls, by going through the documentation and code. in the binary it has an EVP key, Cipher text. The binary is creating a RSA private key from EVP Key , then encrypting our input and checking with cipher text. Dumped the EVP Key, Cipher text from the binary. Written a decrypti...

Alles CTF 2020 Writeups

Image
[*]-challenges     [+] (Rev - 137 pts) Flag Service Revolution     [+] (Rev - 113 pts) prehistoric mario Our Team Invaders ended up at 21th position in `Alles CTF - 2020` conducted by ` Alles team `. The Reverse challs are interesting First one is Nintendo GameCube file, second one is a Apk game [Rev] Flag Service Revolution Given a boot.dol file, a Nintendo GameCube file. Opened it with the dolphin-emu. Then searched how we can disassemble the .dol files and found this https://mkwii.com/showthread.php?tid=1193 used ghidra This is a stripped and statically linked binary, it's hard to trace the functions. Searched for strings appearing on app -> `Cross References` - `main function FUN_8003d4c4 `. The decompiled code of ghidra is too messy with the stripped fu...

BugPoc's XSS challenge, Buggy Calculator writeup

Image
This is a write-up for an XSS Challenge by `BugPoC`, Buggy Calculator (calc.buggywebsite.com) that popped out on Twitter recently ( link ) This is a website of calculator app designed by angular js. Eval js by using gadget inside the script (which is the functionality of the caculator) is the best part in this challenge. Buggy Calculator A Website running at http://calc.buggywebsite.com/ . It's a complete client side application. Our goal is to popup alert(domain). Functionality is simple like a calculator, on button clicks it is constructing the equation(string), and finally eval that equation on calculate. Observation - 1 By reading the source code The app is using iframe( frame.html ) to display the result by using ` postMessage ` communication. <iframe name="theiframe" style="height:65px;width:100%; left:-100px; margin-top:-05px;margin-bottom...