Open in app
Home
Notifications
Lists
Stories

Write
9710810511512197
9710810511512197

Home

Dec 10, 2021

Hacking Series Part 21

Challenge: PowerFul_Crackme — Category: reverse engineering We are given an ELF named “PowerFul_Crackme”. After opening it in IDA, you see that the program enters in main and prints “The magic string: ” with printf. It then goes on to initialize a counter at loc_11B3 from 0–9, which is stored in var_4. If the…

Reverse Engineering

3 min read

Hacking Series Part 21
Hacking Series Part 21

Aug 30, 2021

Hacking Series Part 20

Challenge: Holiday Hack Objective 11b Category: pwn?? blockchain?? We are given part of a blockchain and told there is an altered block somewhere. The goal was to find the four altered bytes in the new block and change it back to their original values, or essentially, reproduce the original block…

Hacking

2 min read


Aug 30, 2021

Hacking Series Part 19

Challenge: Holiday Hack Objective 11a — Category: pwn?? blockchain?? We are given a part of a blockchain and told to predict the nonce of block 130000. Since every block prior to the 130000th has a nonce, we can use the pseudo-randomness of these numbers to predict the future ones. …

Hacking

2 min read

Hacking Series Part 19
Hacking Series Part 19

Mar 15, 2021

Hacking Series Part 18

Challenge: Phonebook — Category: web security We are given an instance of a website that requires us to login when we navigate to it. There is a message indicating that there is a new update with how users can login and it is posted by someone who is likely an admin of the…

Hacking

3 min read

Hacking Series Part 18
Hacking Series Part 18

Mar 13, 2021

Hacking Series Part 17

Challenge: Impossible Password — Category: reverse engineering We are given a file called “impossible_password.bin”. Using xxd, I looked at the header of the file and found out that it was actually an ELF which meant that it could be executed. …

Hacking

3 min read

Hacking Series Part 17
Hacking Series Part 17

Mar 7, 2021

Hacking Series Part 16

Challenge: WebNet0 — Category: Forensics We are given a Wireshark packet capture file called “capture.pcap” and an RSA key called “picopico.key”. When you open capture.pcap in Wireshark you see a TLS stream that is likely to hold the flag somewhere in it. When you follow the TLS stream, you can tell that it’s…

Hacking

2 min read

Hacking Series Part 16
Hacking Series Part 16

Feb 21, 2021

Hacking Series Part 15

Challenge: Investigative Reversing 3 — Category: reverse engineering and forensics We are given a binary called “mystery” and an image named “encoded.bmp”. When I opened mystery in IDA, I saw that three files were being opened, two that are being read from (flag.txt and original.bmp) and one that is being appended to (encoded.bmp). …

Hacking

4 min read

Hacking Series Part 15
Hacking Series Part 15

Feb 18, 2021

Hacking Series Part 14

Challenge: messy-malloc — Category: binary exploitation We are given a binary and it’s source code called “auth” and “auth.c”. By looking at auth.c, you can tell that this program is essentially a simple authentication program. …

Hacking

2 min read


Feb 6, 2021

Hacking Series Part 13

Challenge: OTP Implementation — Category: reverse engineering We are given a binary called “otp” and a text file called “flag.txt”. If you execute otp, you will notice that you need to pass a key as an argument in order for the program to run. When I opened otp in IDA, I saw that this…

Hacking

4 min read

Hacking Series Part 13
Hacking Series Part 13

Feb 6, 2021

Hacking Series Part 12

Challenge: vault-door-6 — Category: reverse engineering We are given java source code called “VaultDoor6.java”. Inside this file there is a password system, where if you input the correct password (or the flag) an “Access granted” message will be printed. …

Hacking

2 min read

Hacking Series Part 12
Hacking Series Part 12
9710810511512197

9710810511512197

some chaos for you

Following
  • Alessandro Butler

    Alessandro Butler

  • Adara Hagman

    Adara Hagman

  • Ruhani Walia

    Ruhani Walia

  • Ridhi Gopalakrishnan

    Ridhi Gopalakrishnan

  • x0rz

    x0rz

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable