CTFLearn AndhraPradesh

A problem to reverse engineer and find the correct condition. Problem link In this challenge, I have to change the value of con1~con5 in order to pass tests in _start~test4. ; Andrha Pradesh Assembler Challenge for CTFLearn ; This challenge focuses on cmp, je and jne section .data welcome db "Hello CTFlearn Andhra Pradesh Assembler Challenge!",0x0a,0x00 noflag db "Sorry no flag for you :-(",0x0a,0x00 alldone db "All Done!",0x0a,0x00 baddata db "Baad Data!...

August 17, 2023 · 4 min · 770 words · Kazuhiro Funakoshi

CTFLearn Programming a Language

A problem to implement a stack machine. Problem here This problem asks to program a stack machine. My Python3 answer is below. The size of stack is unchecked. from collections import deque import sys class StackLang: def __init__(self): self.stack = deque() self.stack.append(0) def run(self, filename): with open(filename, 'r') as file: txt = file.read() for i in txt: if i == '-': self.minus() elif i == '+': self.plus() elif i == '>': self....

August 16, 2023 · 2 min · 249 words · Kazuhiro Funakoshi

CTFLearn Tone Dialing

A problem that encodes the flag into wave file. Problem here This problem consists of two parts: Obtain the code from wav file Decode Obtain the code from wav file I used dtmf-decoder that extract the tone dialing as decimal. I already have Python3 environment and I don’t want to mess it up. I made a modification of its installation. $ git clone https://github.com/ribt/dtmf-decoder.git $ cd dtmf-decoder/ $ python3 -m pip install -r requirements....

August 16, 2023 · 2 min · 283 words · Kazuhiro Funakoshi

Vulnerability Assessment Report

Back to Vulnerbility Assessment System Description The server hardware consists of a powerful CPU processor and 128GB of memory. It runs on the latest version of Linux operating system and hosts a MySQL database management system. It is configured with a stable network connection using IPv4 addresses and interacts with other servers on the network. Security measures include SSL/TLS encrypted connections. Scope The scope of this vulnerability assessment relates to the current access controls of the system....

July 26, 2023 · 3 min · 442 words · Kazuhiro Funakoshi

Apply Filters to SQL Queries

Back to SQL Queries Project description This project is for investigating security issues to help keep the system secure. Based on findings that some potential security issues involve login attempts and employee machines. We use SQL filters to retrieve records from different datasets and investigate potential security issues. Retrieve after hours failed login attempts In order to list all after-hours failed logins, which are suspicious in this case, we performed a SQL query as follows....

July 18, 2023 · 2 min · 317 words · Kazuhiro Funakoshi