tag:blogger.com,1999:blog-8932940317431555433.post4561391401087068588..comments2023-11-23T09:22:35.682-05:00Comments on Ghetto Forensics: Running the Labyrenth: Unit 42 CTFBrian Baskinhttp://www.blogger.com/profile/06612606264670329434noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-8932940317431555433.post-58890897004459422482016-08-22T03:22:23.962-04:002016-08-22T03:22:23.962-04:00Nice writeup! I really enjoyed reading this, thank...Nice writeup! I really enjoyed reading this, thanks :)<br /><br />In the AntiD challenge (Windows #1), here is the code that prints the flag without bruteforcing, since the value of v2 is easy to calculate:<br /><br />https://gist.github.com/levisre/eef06125a0a2bf5dfb7c3972a10f8040Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-8932940317431555433.post-53670876723804157892016-08-20T14:57:03.180-04:002016-08-20T14:57:03.180-04:00The code blocks in black are my code in Python, ye...The code blocks in black are my code in Python, yes. I've added shebangs to each to make that stand out. I should've clarified that up front.Brian Baskinhttps://www.blogger.com/profile/06612606264670329434noreply@blogger.comtag:blogger.com,1999:blog-8932940317431555433.post-10889107801518539222016-08-20T13:24:04.030-04:002016-08-20T13:24:04.030-04:00you did this in Python?you did this in Python?FIBBER-BOYhttps://www.blogger.com/profile/12489385873368150494noreply@blogger.comtag:blogger.com,1999:blog-8932940317431555433.post-10904406172601947712016-08-17T13:46:14.481-04:002016-08-17T13:46:14.481-04:00Great write up. I too got stuck with windows#4, a...Great write up. I too got stuck with windows#4, and I had the same assumptions that you did. Now that the CTF is closed, I can't wait to read other great write-ups about it to see how people attacked the different issues they encountered. Plus, I want to get all the binaries from each tracks. :)Anonymousnoreply@blogger.com