Writeup for Pwnable.tw #6
During Christmas, I had some spare time, decided to give pwnable.tw another try and began solving challenge #6: You can connect to a service using nc chall.pwnable.tw 10101 The service binary dubblesort and its libc […]
During Christmas, I had some spare time, decided to give pwnable.tw another try and began solving challenge #6: You can connect to a service using nc chall.pwnable.tw 10101 The service binary dubblesort and its libc […]
Last reversing CTF was so much fun, I started directly with the next challenge. For me, it was a very hard one and it took me several weeks (although I recognized, after reading other peoples […]
On our last hackathon, Malfunction, Scotch and me tried to beat several CTFs. This article sums up the results of challenge #3 on pwnable.tw. The basic settings are: A calculator service runs on chall.pwnable.tw, port […]
Introduction At the moment, I am working on a new Hyperion version with 64 bit support. The decryption stub of Hyperion is written using the flat assembler for 32 bit platforms. Therefore, the whole code […]
I recently stumbled upon an interesting behaviour of the PE loader. Before releasing a new Hyperion version, I usually test it with several executables on different Windows platforms. In my old XP VM, everything went […]