Skip to main content

Get the Reddit app

Scan this QR code to download the app now
Or check it out in the app stores
r/CTFlearn icon
r/CTFlearn icon

r/CTFlearn

members
online




Need help Need help

I've been spending 6/7 hrs a day learning cybersecurity (for the last 17 days), i've learned the basics and something more, i've done all the easier ctf problems, but rn i'm struggling doing the web and binary/reverse medium problems. Do you have anything to recommend to me, like some videos or sites where I should look to learn how to do any type of pwn/reverse/web at a medium/difficult level. i'm really stucked and idk what to do. tysm for any kind of help.













How to abuse stack overflow ? How to abuse stack overflow ?

I am not good at rev. I managed to decompile C code - thus I can see I have a say 21 character buffer char array on the stack (local variable). My input is copied into it with no bounds checking, and I can see I can get some misbehaving overflowing the buffer. And a dump.

Now, how do I use this to inject code? Say a reverse shell or something else ? Are there any relative easy guides out there ?

x86 assembly isn’t my strongest - But plenty of experience for old days with Z80 and 68k (writing assembler, debugging, simple bypassing of checks etc)



Cryptography CTF - Python, AES, CFB mode
u/[deleted] avatar[deleted]
Cryptography CTF - Python, AES, CFB mode

I have this cryptography CTF to solve, which is a vulnerable python implementation of AES in CFB mode. There is the main file we're trying to decrypt and 26 other files, which I'm guessing are the partial ciphertexts in CFB mode. There is also the not-important.txt file which contains this string: e20aad41819bf26e6b1de4f5c61f7c04, which might be key, might be IV, not sure.
Does anyone know how to solve this?
Instructions and source files:
https://courses.cs.ut.ee/2024/secprog/spring/Main/Homework3


New to the CTF world, looking for help New to the CTF world, looking for help

Hello CTF community , I am kind of new on the cybersecurity field, and my company has made us complete a series of challenges.

I got this issue. I have a photo, from Atenea's oldtimes challenge (https://atenea.ccn-cert.cni.es/challenges?category=criptografa-y-esteganografa) using exiftool, I can see that in the “rights” parameter, it has the following information: 2012, VVIDM1VSQDN3dwIiiCd3M2aDNmI=, all rights reserved. That appears to be a base64 string, but when I decode it, I get: UR3UR@3ww"'w3f6b. That indicates another encryption format, but I don't know what it is. I currently find myself out of options on how to solve this challenge.

Could you give me some guide or some source material that can help me solve it?

Thanks in advance.




CTF Challenge CTF Challenge

Can anyone help with this -

Wow my friend's a real rockstar, I mean look at the program they wrote:

revenge is a dish best served cold they say

put revenge into me

death takes my pain

death's touch I long for

it is a sin but

the sin is mine

you are a false prophet

I was good, I did good, but

you said no

give it back

the lord takes everything

passion is nought but fire

reason is the smith who tempers the fire and yet

if passion without reason isn't nothing

what is the point?

the moon is beautiful tonight

put the lord taking revenge into a prayer

Let faith be death taking me

Whisper a prayer with faith




CTF QUESTION: CTF QUESTION:

Hi .., I am solving one question in the Google CTF , beginners quest , so in the second level of the quest(1837) , there is one audio of the morse code , and I got the text through the decoder , and from the hint I got that ADFGVX cipher is again encrypted using 7 word key , and I tried to findout how , and I read some writeupss too , but didn't understand them , can anyone please help me.

Details:
https://capturetheflag.withgoogle.com/beginners-quest 1837 level challenge -2 .