|
You are here |
blog.stalkr.net | ||
| | | | |
timelessname.com
|
|
| | | | | [AI summary] The article details the author's process of creating the smallest possible x86 ELF binary that outputs 'Hello World' on Ubuntu Linux, involving C, assembly, and hex editing to minimize the file size. | |
| | | | |
blog.nuculabs.dev
|
|
| | | | | Hello, In this article I'll present you my solution on the Chapter 5 CTF from the book Practical Binary Analysis. For this binary, the hint is to fix four broken things. Running file gives us the following response: 1 2 binary@binary-VirtualBox:~/ctf$ file ./lvl3 ./lvl3: ERROR: ELF 64-bit LSB executable, Motorola Coldfire, version 1 (Novell Modesto) error reading (Invalid argument) And the readelf command gives us: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 binary@binary-VirtualBox:~/ctf$ readelf -h ./lvl3 ELF Header: Magic: 7f 45 4c 46 02 01 01 0b 00 00 00 00 00 00 00 00 Class: ELF64 Data: 2's complement, little endian Version: 1 (current) OS/ABI: Novell - Modesto ABI Version: 0 Type: EXEC (Executable file) Machine: Motorola Coldfire Version: ... | |
| | | | |
blog.dornea.nu
|
|
| | | | | [AI summary] The blog post discusses the process of creating and executing a shellcode in C to read a file named 'flag.txt' and dump its content, including assembly code, compilation steps, and execution considerations. | |
| | | | |
www.da.vidbuchanan.co.uk
|
|
| | | [AI summary] The CTF writeup details the process of solving a cryptographic challenge involving AES key recovery through side-channel attacks. The key was recovered by analyzing timing leaks from the AES decryption process, specifically the doSboxInv function's execution time. The recovered round 10 key was then used to invert the AES key schedule to obtain the original encryption key, which was the flag. The writeup also discusses the challenges of directly recovering the original key due to timing noise and the importance of using statistical correlation to identify the correct key. | ||