Digital Operatives
  • Home
  • Blog
  • Careers
  • Contact
  • Products
  • Research
  • Services
Select Page
The Cyber-Insecurity of WeWork – Shared Offices and Cracking WiFi with Weak WPA2 Passwords

The Cyber-Insecurity of WeWork – Shared Offices and Cracking WiFi with Weak WPA2 Passwords

by digitaloperatives | Oct 10, 2018 | Capture the Flag, Security News

On Monday we became a tenant at the shared office provider WeWork. According to their website, “WeWork is a global network of workspaces where companies and people grow together.” We needed something more flexible while our new corporate office is being...

Ghost in the Shellcode 2015 Write-up, Forensics 200: “CloudFS”

by digitaloperatives | Feb 23, 2015 | Capture the Flag

We began with no hint, and the file ‘cloudfs-31c938df3531611b82fddf0685784a2b67373305ec689015f193a555b756beb2’.  The command file tells us that it is compressed data. $ file cloudfs-31c938df3531611b82fddf0685784a2b67373305ec689015f193a555b756beb2...

CSAW CTF 2014 Qualification Round Write-up, Exploitation 400: “Saturn”

by digitaloperatives | Sep 22, 2014 | Capture the Flag

The annual NYU Polytechnic School of Engineering Cyber Security Awareness Week (CSAW) Capture The Flag (CTF) competition online qualifiers were held September 19-21, 2014.  This is a writeup of one of the Exploitation challenges we solved: "saturn". The...

PHDays CTF Quals 2014 Write-up: "turututu"

by digitaloperatives | Jan 30, 2014 | Capture the Flag

We are given a file, “task.exe,” and told that “smthg wrong with this env.”  Running `file` tells us that this is not an EXE at all: it is an x86_64 ELF.  We try to run it and quickly determine it expects a certain command-line...

PHDays CTF Quals 2014 Write-up: "miXer"

by digitaloperatives | Jan 29, 2014 | Capture the Flag

The description of the task is that the program has been stuck “in a blender.”  Upon opening the program in IDA Pro, it is clear the bytes have been modified, since there are nonsensical instructions and a large block of undecipherable bytes. It is...

PHDays CTF Quals 2014 Write-up Collection

by digitaloperatives | Jan 28, 2014 | Capture the Flag

If you know of a link we have missed, please let us know in the comments and we will add it shortly.  Thanks! Metal Gear Felix http://tasteless.se/2014/01/phd-ctf-quals-2014-rbox-and-metal-gear-felix-writeup/ mp3 me...
« Older Entries

Recent Posts

  • Bug Bounty: An Economic Disadvantage for Researchers?
  • The 10 Humorous But Immutable Laws of Cloud Security
  • Defeating Cisco’s Machine Learning Based Malware Traffic Detection Algorithm
  • The Cyber-Insecurity of WeWork – Shared Offices and Cracking WiFi with Weak WPA2 Passwords
  • Idea Machine – Part 1: Automated Reconnaissance For Penetration Testing

Archives

  • July 2023
  • October 2018
  • September 2018
  • May 2018
  • September 2017
  • August 2017
  • July 2017
  • April 2015
  • February 2015
  • September 2014
  • February 2014
  • January 2014
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • December 2012
  • November 2012
  • October 2012

Categories

  • Capture the Flag
  • Products
  • Research
  • Security News
  • Services
  • Uncategorized