You can download the shabak challenge and try for yourself from here.

When we download the .tar.gz file we see the following directory listing


So we log into the gifon website,

and we can choose a gif, which redirects us to the same site at a different path, for example, here’s the monkey path:

We also see something interesting, the website calculates MD5 for the picture,


No Intro, let’s get right into it.

You can try it out yourself at https://shabakchallenge.com/

When you enter the site, you are prompted with some weird video, and this image:


bof

So, for those of you who don’t know pwnable.kr by now, it’s a CTF website, providing different level challenges including Reverse Engineering, Buffer Overflow exploitations, Shellshock, and basically everything that is Security Research.

So once again we are diving right into our challenge, this time the bof challenge, and once again we are starting right from the first prompt.


uaf

So, for those of you who don’t know pwnable.kr by now, it’s a CTF website, providing different level challenges including Reverse Engineering, Buffer Overflow exploitations, Shellshock, and basically everything that is Security Research.

So once again we are diving right into our challenge, this time the uaf challenge, and once again we are starting right from the first prompt.


In this blog I document my progress along the Practical Reverse Engineering book.

Chapter 1

Exercise 1

The type of [ebp+c] is a char because it is moved into al.
The type of [ebp+8] is of type char *.

So let’s see what this code does:

  1. Stores some pointer to a char array into edi
  2. Stores the same value in edx (keeps a copy of the original, since it’s about to change)
  3. Sets eax to 0
  4. Sets ecx to 0xffffffff (-1)
  5. Repeatedly scan one byte at a time from the char array stored at edi and compare it to eax (0), stop when it…

cmd2

So, for those of you who don’t know pwnable.kr by now, it’s a CTF website, providing different level challenges including Reverse Engineering, Buffer Overflow exploitations, Shellshock, and basically everything that is Security Research.

We’ll dive right into our challenge cmd2, which you can access from the main menu after you sign up. when you click the little Pokemon image you are welcomed with a prompt.

Dan Elkis

I’m feeling really blah-blah, I want to blah-blah-blah, and in the end it means I'll blah-blah-blah-blah-blah-blah-blah.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store