<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Noxctf on noxale</title>
    <link>https://blog.noxale.com/tags/noxctf/</link>
    <description>Recent content in Noxctf on noxale</description>
    <generator>Hugo -- gohugo.io</generator>
    <managingEditor>teamnoxale@gmail.com (noxale)</managingEditor>
    <webMaster>teamnoxale@gmail.com (noxale)</webMaster>
    <lastBuildDate>Tue, 18 Sep 2018 12:48:00 +0500</lastBuildDate>
    
	<atom:link href="https://blog.noxale.com/tags/noxctf/index.xml" rel="self" type="application/rss+xml" />
    
    
    <item>
      <title>[noxCTF] PSRF</title>
      <link>https://blog.noxale.com/post/noxctf-psrf/</link>
      <pubDate>Tue, 18 Sep 2018 12:48:00 +0500</pubDate>
      <author>teamnoxale@gmail.com (noxale)</author>
      <guid>https://blog.noxale.com/post/noxctf-psrf/</guid>
      <description>PSRF Challenge description: &amp;gt; Swisslock is a new company in the Kubernetes security business. Are they worth it?
First time in the website, we don&amp;rsquo;t see anything special aside from a textbox and some images.
 side note: there is an open text box, but you won&amp;rsquo;t get very far by trying web-related vulnerabilities ;)  After viewing the page source we see that the file is really long, after scrolling to the bottom we see the first hint!</description>
    </item>
    
    <item>
      <title>[noxCTF] Ra(p)hic</title>
      <link>https://blog.noxale.com/post/noxctf-raphic/</link>
      <pubDate>Tue, 18 Sep 2018 12:48:00 +0500</pubDate>
      <author>teamnoxale@gmail.com (noxale)</author>
      <guid>https://blog.noxale.com/post/noxctf-raphic/</guid>
      <description>Writeup for Rap(h)ic; Reversing 966 Intro This is a hard Reversing challenge from noxCTF. The solver only gets an ELF file.
Description: There is nothing like overly designed design
The original file is attached at the bottom of the document.
Summary We get an ELF file. Upon execution, it will load another ELF file from its memory into &amp;ldquo;/tmp/&amp;hellip;&amp;rdquo; and execute it.
The processes use a socket to communicate with each other - The parent process sends addresses which the child process later executes and sends its return value back to the parent.</description>
    </item>
    
    <item>
      <title>[noxCTF] noxComputers</title>
      <link>https://blog.noxale.com/post/noxctf-noxcomputers/</link>
      <pubDate>Tue, 18 Sep 2018 12:48:00 +0500</pubDate>
      <author>teamnoxale@gmail.com (noxale)</author>
      <guid>https://blog.noxale.com/post/noxctf-noxcomputers/</guid>
      <description>The Challenge The challenge is basically a computers store service- the user can buy premium user (or multiple users and be eligible for a future discount), buy a computer, return a computer, and show/edit the account details.
The Vulnerability The vulnerability exists in buy_multiple_premium_users(), in the following functionality
void buy_multiple_premium_users() { ... ... if((unsigned short)(user_count + premiums_amount) &amp;gt; ARRAY_MAX) { puts_wrapper(&amp;quot;You can&#39;t create more than 1024 users :(&amp;quot;); return; } .</description>
    </item>
    
    <item>
      <title>[noxCTF] Muhammad Ali</title>
      <link>https://blog.noxale.com/post/noxctf-muhamadali/</link>
      <pubDate>Tue, 18 Sep 2018 10:48:00 +0500</pubDate>
      <author>teamnoxale@gmail.com (noxale)</author>
      <guid>https://blog.noxale.com/post/noxctf-muhamadali/</guid>
      <description>Challenge description:
 Muhammad Ali: &amp;ldquo;I&amp;rsquo;ve Ceen Many Pictures of Knocking-out in my career&amp;rdquo;
 special idea:
1)The main idea of the challenge is ICMP Knocking.
2)This is not a Stego challenge, this is a Networking challenge!
3)solving without understanding(frame contains &amp;ldquo;flag&amp;rdquo;/&amp;ldquo;noxctf&amp;rdquo;,follow each tcp stream) will lead you to stego dead end.
Writeup:
At the beginning of the challenge we get a description: Muhammad Ali: &amp;ldquo;I&amp;rsquo;ve Ceen Many Pictures of Knocking-out in my career&amp;rdquo; ok, it seems like we need to search picture files of knockouts inside the pcap file.</description>
    </item>
    
    <item>
      <title>[noxCTF] Reverse</title>
      <link>https://blog.noxale.com/post/noxctf-reverse/</link>
      <pubDate>Tue, 18 Sep 2018 10:48:00 +0500</pubDate>
      <author>teamnoxale@gmail.com (noxale)</author>
      <guid>https://blog.noxale.com/post/noxctf-reverse/</guid>
      <description>Note: this is not a Reverse challenge
Note: change the flag format from noxctf{X-X-X} to noxCTF{X_X_X}
 Writeup
At the beginning of the challenge we get an executable file, that looks like cmd.
Lets start running commands and look if we see something suspicious
But so far it seems like normal limited cmd.
When we call the &amp;lsquo;netstat&amp;rsquo; command we get a constant output:
 Netstat- Displays protocol statistics and current TCP/IP network connections.</description>
    </item>
    
    <item>
      <title>[noxCTF] SUBliminal</title>
      <link>https://blog.noxale.com/post/noxctf-subliminal/</link>
      <pubDate>Tue, 18 Sep 2018 10:48:00 +0500</pubDate>
      <author>teamnoxale@gmail.com (noxale)</author>
      <guid>https://blog.noxale.com/post/noxctf-subliminal/</guid>
      <description>Challenge description:
 &amp;ldquo;SUBliminal is an Israeli rapper that eschew from Illegal things. (don&amp;rsquo;t smoke weed everyday)&amp;ldquo;.
goo.gl/pSGubK
 special idea:
1. To understand that we interested in the data of the packet that has been sent from illegal subnet ip.
2. To understand that illegal subnet address is an address that belong to subnet(start with 10 or 192) and don&amp;rsquo;t implement the rest of the mask: 10.0.0.?
Writeup:
So, at the beginning of the challenge we get a note: “SUBliminal is an Israeli rapper that eschew from Illegal things.</description>
    </item>
    
    <item>
      <title>[noxCTF] Sublime</title>
      <link>https://blog.noxale.com/post/noxctf-sublime/</link>
      <pubDate>Tue, 18 Sep 2018 10:48:00 +0500</pubDate>
      <author>teamnoxale@gmail.com (noxale)</author>
      <guid>https://blog.noxale.com/post/noxctf-sublime/</guid>
      <description>Sublime is a medium difficulty cryptography challenge about the substitution cipher. I made this challenge more difficult by setting the substitution range of values to the whole ASCII table.
To solve this challenge, you first need to perform a frequency analysis on the given ciphertext, omitting the variety of punctuation marks from the analysis but spaces (e.g. dots, exclamation marks, question marks etc..) and sort the frequencies from the highest to the lowest.</description>
    </item>
    
  </channel>
</rss>