Jump to content
View in the app

A better way to browse. Learn more.

Tuts 4 You

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

Featured Replies

3 minutes ago, f355 said:

ch13

  Hide contents

so I wrote a reverse shell server-side script, so I can issue commands to the client and receive responses. I found 2 commands one gives life tip, another tells I need to provide password. I am kind of stuck at this point, any pointers would be appreciated..

Also the debugging here is tricky since the executable relaunches itself after every command, so it is hard to debug how commands are processed and responses generated. Any tips for proper debugging? Should I patch the binary so it doesn't terminate itself?

 

Spoiler

Hi! Yes, you are in right direction. You should find out what password you should provide. Try to trace that via x64dbg or ida pro. Look closely to constants put to registers :)

 

Also i am curious did you managed to deobfucate code - and how)

 

  • Replies 104
  • Views 32.2k
  • Created
  • Last Reply

Top Posters In This Topic

Most Popular Posts

  • My primary machine actually decided to die on me today... And since I'm "old sk3wl CTFer", I don't have all my infra in the cloud.    

  • Oh.... I've solved #ch10, that was crazy. The most difficult task in this year. However, I haven't seen 11,12,13 yet... 🙂 Only 1 advice: take a bag of the RedBull and be patient

Posted Images

I know there's not much time left, but anyone want to drop a hint for the end of ch13? I think I understand everything in the program, but I just don't see how to work forwards/backwards to identify the right PRNG seed. I have the whole thing pretty well de-obfuscated, and I can run the flag decryption in unicorn. But it doesn't seems practical to brute force. Am I just overlooking something simple? Or is it an Angr problem... then I'll just give up now.

ch13

 

Saw that on twitter earlier, that's a great explanation. My bad for treating the ROP code as an opaque operation, I wouldn't have thought it would be decrypting and re-encrypting the flag haha. Although the official writeup makes even less sense now.

  • 8 months later...

Anyone received a cheap flimsy paper flag, *cough cough* I mean "prize" for their completion of flare-on?  For 2022, I got a pretty heavy medal.  The prize for 2023 was a bit disappointing. :(

Create an account or sign in to comment

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.