clooooode

a.k.a. clo5de

## Problem Points: 1pt

1
2
3
4
5
6
7
8
9
We all make mistakes, let's move on.
(don't take this too seriously, no fancy hacking skill is required at all)

This task is based on real event
Thanks to dhmonkey

hint : operator priority

ssh [email protected] -p2222 (pw:guest)
Link
Read more »

Basic instructions

(MOV) Load a immediate value into register

# represents a immdediate value. Usage MOV register, #value
MOV R0, #10 means register0 = 10

Read more »

This is 2018 AIS3 prexam crypto writeups.

Read more »

This is 2018 AIS3 prexam pwn writeups.

Read more »

This is 2018 AIS3 prexam reverse writeups.

Read more »

This is 2018 AIS3 prexam web writeups.

Read more »

0x00 This is a story about a CTF newbie.

大概在上個禮拜,我還只是聽過CTF,知道是個搶旗遊戲。
但是要怎麼搶,要怎麼逆向,要怎麼走pwn gdb都還是零基礎。
就連

1
2
3
4
int main() {
int a = 1;
return 0;
}
main
1
2
3
4
5
6
0x00000000004004d6 <+0>:     push   rbp
0x00000000004004d7 <+1>: mov rbp,rsp
0x00000000004004da <+4>: mov DWORD PTR [rbp-0x4],0x1
0x00000000004004e1 <+11>: mov eax,0x0
0x00000000004004e6 <+16>: pop rbp
0x00000000004004e7 <+17>: ret
0%