Vaut mieux sécuriser que guérir This challenge had no sense for the first part of the flag, but we will see that later. Here we have a 2G memory dump. The fist thing, we notice is that we have ...
CTFs | 404CTF_2024 | Investigation Numerique | Un boulevard pour pointer
Un boulevard pour pointer In this challenge, we are given a zip file containing two PDF and a disk image. The two PDF contains linux forensic commands like file, strings, fdisk -l or mmls. Firs...
CTFs | 404CTF_2024 | Investigation Numerique | Tir aux logs
Tir aux logs In this challenge, we are given a text log file of 56 lines. The first look we have at the file, it looks like someone is trying to do an SQLi: There was two ways to solve it here....
CTFs | 404CTF_2024 | Investigation Numerique | Darts Bank
Darts Bank In this challenge, we are given this pcap file. If we open it using wireshark, we can see a lot of HTTP traffic. When we click on the first one and follow the TCP stream, we get the ...
CTFs | 404CTF_2024 | Investigation Numerique | Du poison
Du poison In this AI challenge, we are tasked to deteriorate the accuracy of the AI model that is trained locally. In this challenge, to be able to do this, we can modify the value of the weight...
CTFs | 404CTF_2024 | Exploitation de Binaire | Pseudoverflow
Pseudoverflow Here we are given the course binray. When opened in Ghidra, we can see the following: At first, we had two variables that had the hex values of perds and \0. But once we rede...
CTFs | 404CTF_2024 | Exploitation de Binaire | Jean Pile
Jean Pile Here, we have the following binary. First, lets check the type of the file and its protections: So we know that the ASLR is enabled and that we can execute code in the stack (NX di...
CTFs | 404CTF_2024 | Cryptanalyse | Bebe Nageur
Bebe Nageur In this challenge, we are tasked to retro-engineer a python code and exploit its cryptographic flaws. The given code is the following: from flag import FLAG import random as rd char...
Notes | AD | AD Basics
Active Directory Introduction Well, well well… Here we are. Doing an Active Directory introduction note. Lets start by defining what is Active directory. Active Directory (AD), is the windows dir...
CTFs | Finale_CTF_INSA_2024 | Realiste
Réaliste Kerb1 For this challenge, we are going to use the well known AS-REPRoasting attack. I will not explain in detail how the attack work but you can have more information here. The main idea...
- CTFs | 404CTF_2024 | Investigation Numerique | Vaut mieux sécuriser que guérir
- CTFs | 404CTF_2024 | Investigation Numerique | Du poison
- CTFs | 404CTF_2024 | Investigation Numerique | Darts Bank
- CTFs | 404CTF_2024 | Investigation Numerique | Un boulevard pour pointer
- CTFs | 404CTF_2024 | Investigation Numerique | Tir aux logs