Digital Operatives
  • Home
  • Blog
  • Careers
  • Contact
  • Products
  • Research
  • Services
Select Page

Ghost in the Shellcode 2014 Write-up Collection

by digitaloperatives | Jan 21, 2014 | Capture the Flag

We had a great time solving a few problems from the Ghost in the Shellcode CTF this past weekend and wanted to have an easy place with links to write-ups from all around the Internet, so we created it here.  If you know of a link we have missed, please let...

Unambiguous Encapsulation: Defending Against "Packet in Packet" Attacks

by digitaloperatives | Jan 20, 2014 | Research

A couple days ago, Dominic Spill and Michael Ossman presented an interesting talk at Shmoocon on using specially crafted error correcting codes to have unambiguous encapsulation, preventing attacks like “Packet in Packet.” This appears to be the...

Ghost in the Shellcode 2014 Write-up, Choose Your Pwn Adventure 2 200: "Portal"

by digitaloperatives | Jan 19, 2014 | Capture the Flag

The video contains a second audio stream, as indicated by VLC here: The second audio stream is an SSTV stream containing image information.  We extract the stream with the following command (the same file as the download was “credits.ogv” in the...

Ghost in the Shellcode 2014 Write-up, Crypto 75: "dogecrypt"

by digitaloperatives | Jan 19, 2014 | Capture the Flag

We are given the hint “Solveable in <5m. Much attack very wamerican-small.” The file begins with “VimCrypt~01!” and research on vim’s encryption method reveals that this means the file has been encrypted with the Unix crypt function....

Ghost in the Shellcode 2014 Write-up, Trivia 150: "inview"

by digitaloperatives | Jan 19, 2014 | Capture the Flag

Viewing the file with whitespace visible in vim shows that there are strange combinations of tabs and spaces at the end of each line. Assuming there’s more to whitespace than meets the eye, we search for all non-whitespace characters: …and remove them. We...
Next Entries »

Recent Posts

  • Bug Bounty: An Economic Disadvantage for Researchers?
  • The 10 Humorous But Immutable Laws of Cloud Security
  • Defeating Cisco’s Machine Learning Based Malware Traffic Detection Algorithm
  • The Cyber-Insecurity of WeWork – Shared Offices and Cracking WiFi with Weak WPA2 Passwords
  • Idea Machine – Part 1: Automated Reconnaissance For Penetration Testing

Archives

  • July 2023
  • October 2018
  • September 2018
  • May 2018
  • September 2017
  • August 2017
  • July 2017
  • April 2015
  • February 2015
  • September 2014
  • February 2014
  • January 2014
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • December 2012
  • November 2012
  • October 2012

Categories

  • Capture the Flag
  • Products
  • Research
  • Security News
  • Services
  • Uncategorized