We had a great time solving a few problems from the Ghost in the Shellcode CTF this past weekend and wanted to have an easy place with links to write-ups from all around the Internet, so we created it here. If you know of a link we have missed, please let...
A couple days ago, Dominic Spill and Michael Ossman presented an interesting talk at Shmoocon on using specially crafted error correcting codes to have unambiguous encapsulation, preventing attacks like “Packet in Packet.” This appears to be the...
The video contains a second audio stream, as indicated by VLC here: The second audio stream is an SSTV stream containing image information. We extract the stream with the following command (the same file as the download was “credits.ogv” in the...
We are given the hint “Solveable in <5m. Much attack very wamerican-small.” The file begins with “VimCrypt~01!” and research on vim’s encryption method reveals that this means the file has been encrypted with the Unix crypt function....
Viewing the file with whitespace visible in vim shows that there are strange combinations of tabs and spaces at the end of each line. Assuming there’s more to whitespace than meets the eye, we search for all non-whitespace characters: …and remove them. We...