Posts
Ashiq's blog
Cancel

This post contains the solutions of all 8 Damn Vulnerable Defi challenges. The challenges are focused around exploiting soldity-based smart contracts. If any of the solutions are unclear, please re...

hello This was a sanity check to ensure that your setup is working. For each challenge, we’re given our own private blockchain instance where the setup contracts were deployed and for us to solve....

Intro This post is a writeup of all of the blockchain challenges hosted by the 0x41414141 CTF. I was only planning on writing up one or two challenges, but I saw that many participants were strugg...

Brief Santa’s ELF holomorphing machine was a programming challenge described by the following brief: We’re also given a text file with about 800 functions and complex numbers, as follows: u = ...

We’re given a binary with a description “I went to the hardware store yesterday and bought a new lock, for some reason it came on a flash drive. Can you figure out how to unlock it? I really need t...

We’re given an Android app with the hint “An app that gets the flag for you! What more could you possibly want?”. The app has 4 main buttons, and after each button press we get a “Response Code: 20...

Prehistoric mario was a reverse engineering challenge from the ALLES! CTF. We are given an APK and the hint is that we need to trigger the right boxes to get the flag. The game is a platformer with...

Tornado was a reverse engineering challenge from the Fword CTF. We are given the following Python file: #!/usr/bin/python3 from Crypto.Cipher import AES from Crypto.Util.Padding import pad from Cr...

Trending Tags

Trending Tags