Deva [ Me , Myself & InfoSec]

A place of my own for sharing my thoughts !

Monday, March 25, 2013

iCTF 2013 writeup collection


water 
https://rdot.org/forum/showthread.php?t=2671
http://h4des.org/blog/index.php?/archives/333-ictf-2013-water-write-up.html

airplane
https://alexbers.com/ictf2013/airplane/index.html
http://rep.github.com/ictf-2012-airplane-exploit.html

traintrain
http://www.blue-lotus.net/ictf-2013-traintrain-writeup/

nuclearboom
http://codezen.fr/2013/03/24/ictf-2013-ctf-nuclearboom-writeup/

powerplan
http://www.rogdham.net/2013/03/23/ictf-powerplan-write-up.en

curiousityblogger
http://www.blue-lotus.net/ictf-2013-curiosity-writeup/

Posted by Deva at Monday, March 25, 2013 No comments:
Labels: CTF, ictf, writeup

Tuesday, March 19, 2013

Forbiddenbits CTF 2013 writeup collection


IMAfreak (400)
http://www.sinfocol.org/2013/03/imafreak-forbiddenbits-2013/
http://codezen.fr/2013/03/17/forbidenbits-ctf-2013-web-600-imafreak-write-up/

Invisible (150)
http://sysexit.wordpress.com/2013/03/17/forbiddenbits-ctf-2013-invisible-150-write-up/
http://ge0-it.blogspot.in/2013/03/forbiddenbits-ctf-writeup-invisible.html

Poir (150)
http://sysexit.wordpress.com/2013/03/17/forbiddenbits-ctf-2013-poir-150-write-up/
http://f0rmer.blogspot.in/2013/03/forbiddenbits-ctf-2013-poir-write-up.html

294  (250)
http://f0rmer.blogspot.in/2013/03/forbiddenbits-ctf-2013-294-write-up.html

old (50) 
http://sysexit.wordpress.com/2013/03/17/forbiddenbits-ctf-2013-old-50-write-up/

Hidden 1 & 2 
http://achn30.blogspot.ru/2013/03/forbiddenbits-ctfwrite-uphidden1-hidden2.html

Nazi War (200)
http://wiki.zenk-security.com/doku.php?id=forbiddenbits_2013_naziwar

x93 (350)
http://wiki.zenk-security.com/doku.php?id=forbiddenbits_2013_x93

x94 (250)
http://wiki.zenk-security.com/doku.php?id=forbiddenbits_2013_x94

Captain Crunch (250)
http://wiki.zenk-security.com/doku.php?id=forbiddenbits_2013_crunch
http://dxp2532.blogspot.in/2013/03/forbiddenbits-2013-crunch-250.html

Smelf (200)
http://v0ids3curity.blogspot.in/2013/03/forbiddenbits-ctf-2013-smelf-200-team.html
https://www.phx2600.org/forum/viewtopic.php?t=2405&p=6828#p6828
Posted by Deva at Tuesday, March 19, 2013 1 comment:
Labels: CTF, forbiddenbits, writeup
Newer Posts Older Posts Home

About Me

Deva
I am a digital forensic student.Interest areas include IDS/IPS, malware analysis, honeynets & CTF.
View my complete profile

Pages

  • Home
  • InfoSec Conference & CTF List

My Blog List

  • Forensic Focus Blog
    Magnet Forensics Acquires Dark Circuit Labs, Enhancing Vulnerability Research & U.S. Federal Support
    8 hours ago
  • Schneier on Security
    Where AI Provides Value
    15 hours ago
  • Didier Stevens
    New Tool: myipaddress.py
    3 days ago
  • Krebs on Security
    Inside a Dark Adtech Empire Fed by Fake CAPTCHAs
    5 days ago
  • Dancho Danchev's Blog - Mind Streams of Information Security Knowledge
    Looking for a Python Developer or a Team of Python Developers
    6 days ago
  • Malware Analysis
    REPRINT of http://contagiodump.blogspot.com/2013/09/sandbox-miming-cve-2012-0158-in-mhtml.html Sandbox MIMIng. CVE-2012-0158 in MHTML samples and analysis Unpublished May 27, 2024
    1 week ago
  • Windows Incident Response
    I've Seen Things
    3 weeks ago
  • TaoSecurity
    Creating a Large Text File Viewer by Vibe Coding with Visual Studio Code, Cline, OpenRouter, and Claude 3.7
    2 months ago
  • NirBlog
    Updates history viewer for Windows 11
    2 months ago
  • Sketchymoose's Blog
    Gotta Captcha Them All!
    3 months ago
  • SANS Computer Forensic Investigations and Incident Response
    Top 5 Steps to Immerse yourself into the cybersecurity field
    5 years ago
  • carnal0wnage.attackresearch.com
    Devoops: Nomad with raw_exec enabled
    5 years ago
  • grand stream dreams
    Current Browser Extensions: Vivaldi, Firefox, and Chromium
    6 years ago
  • HolisticInfoSec
    toolsmith #132 - The HELK vs APTSimulator - Part 2
    7 years ago
  • Cheeky4n6Monkey - Learning About Digital Forensics
    Monkey takes a .heic
    7 years ago
  • Ex Forensis
    Pokemon Go: The Perfect Storm of Novelty and Nostalgia
    8 years ago
  • Microsoft Malware Protection Center
    Nemucod dot dot..WSF
    8 years ago
  • Digital Forensics Stream
    Fun with Recycle Bin $I Files & Windows 10
    9 years ago
  • Digital Forensics Solutions
    Cara Memperbaiki Flashdisk yang Tidak Bisa di format
    9 years ago
  • Journey Into Incident Response
    Blaming Others
    9 years ago
  • Fast Horizon
    Creepy Dystopian Reality mirrors Cyber Fiction
    10 years ago
  • JL's stuff
    Volshell Quickies
    10 years ago
  • Open Security Research
    A Brief Overview of the Google Authenticator
    10 years ago
  • The Digital Standard
    One Step Ahead Part 3
    10 years ago
  • Forensicaliente - because digital forensics is 'hot'
    It's a Groovy Kind of Risk
    10 years ago
  • ForensicZone
    Wisconsin Association of Computer Crime Investigators 2013 Conference
    11 years ago
  • Sploited
    SANS Forensic Artifact 7: Last Visited MRU
    12 years ago
  • Computer Forensics and IR - What's New?
    IEF - great new updates including Gigatribe Chat!
    14 years ago
  • IR and forensic talk
  • Site Home
  • Malware Analysis Blog
  • Offensive Computing - Community Malicious code research and analysis

Blog Archive

  • ►  2014 (3)
    • ►  March (1)
    • ►  January (2)
  • ▼  2013 (3)
    • ►  April (1)
    • ▼  March (2)
      • iCTF 2013 writeup collection
      • Forbiddenbits CTF 2013 writeup collection
  • ►  2012 (8)
    • ►  October (1)
    • ►  June (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (2)
    • ►  January (2)
  • ►  2011 (8)
    • ►  September (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (3)
  • ►  2010 (2)
    • ►  May (1)
    • ►  April (1)
  • ►  2006 (1)
    • ►  October (1)
Picture Window theme. Theme images by enot-poloskun. Powered by Blogger.