BlahCats Blog

Tales of a binary encoded life...

BCTF 2016 - Ruin

Published by hugsy , on 21 March 2016 , under ctf

This is an ARM 32b exploitation challenge part of the BCTF competition, which I’ve enjoyed playing with the team TheGoonies. During the competition, only 18 teams (out of the 500+) were able to solve …

0ctf 2016 - Warmup write-up

Published by hugsy , on 14 March 2016 , under ctf

I participated to 0ctf but only had time to play for the reversing challenge trace (write-up coming up soon) during the competition time. I did this challenge only for fun after the CTF was over so I …

BKPCTF 2016 - Complex Calc

Published by hugsy , on 8 March 2016 , under ctf

The challenge is the sequel to simple_calc. If you haven’t read our write-up, now is the time 😊 Info ~ $ file d60001db1a24eca410c5d102410c3311d34d832c d60001db1a24eca410c5d102410c3311d34d832c: ELF 64-…

BKPCTF 2016 - Simple Calc

Published by hugsy , on 7 March 2016 , under ctf

Info ~/cur/simple_calc $ file b28b103ea5f1171553554f0127696a18c6d2dcf7 b28b103ea5f1171553554f0127696a18c6d2dcf7: ELF 64-bit LSB executable, x86-64, version 1 (GNU/Linux), statically linked, for GNU/Li…

Using new syscalls for read/write arbitrary memory on Linux.

Published by hugsy , on 23 December 2013 , under research

Even though well known methods exist to bypass ptrace deactivation on a process when spawning (fake ptrace() preloading, breakpoint on ptrace(), etc… ), it is trickier when process is already protecte…