I’ve moved this blog to https://faith2dxy.xyz. I rewrote the new blog in gatsby.js to make it easier to maintain.| faraz.faith
Disclaimer: I did not solve this challenge during the CTF.| faraz.faith
I didn’t get much time this weekend for this CTF due to having to study for two tests. I only spent a couple hours and managed to solve one and sum, the two easy pwn challenges.| faraz.faith
I didn’t get much time this weekend for this CTF due to having to study for two tests. I only spent a couple hours and managed to solve one and sum, the two easy pwn challenges.| faraz.faith
HITCON CTF 2019 Qualifiers just finished this weekend, and it was fun! I played with my team 0x1 and got 59th place.| faraz.faith
I played this CTF with the team warlock_rootx. The pwn challenges were pretty good, I solved all of them except for one.| faraz.faith
I wasn’t initially planning on playing picoCTF 2019, as the challenges are generally extremely easy. That was until one of my friends told me about ghost_diary. Of course I’m down if there are some heap exploitation challenges!| faraz.faith
BSides Delhi 2019 turned up with some amazing pwn challenges this year. I was only able to solve this one, but big props to the organizers and challenge authors for an amazing CTF!| faraz.faith
Very tiny binary. I used SigReturn Oriented Programming (SROP) to exploit it.| faraz.faith