Here are a few of the write-ups I've finished.
https://github.com/straithe/CTF_Work

I have a few more to write up and they will be up on my github within the
week.



On Mon, Sep 23, 2013 at 9:13 AM, Alex Weber <alexw...@gmail.com> wrote:

> Hey everyone,
>
> This weekend, SkullSpace played in CSAW CTF 2013 put on by the ISIS Lab at
> NYU Poly.
> https://ctf.isis.poly.edu/scoreboard/
>
> A few of us met up on Friday to socialize and capture some flags. We
> worked on the CTF for a couple of hours before we split up to do other
> things. Throughout the weekend, we poked at the challenges that gave us
> trouble, eventually finishing with 19 flags and 1750 points.
> We placed 289th of over 1,380 scoring teams.
>
> Some of the challenges we solved involved breaking a bad Web application
> that put session cookies in the URL, reverse-engineering a .NET executable
> to find a hidden string, tracking down an obscure piece of information
> about a well-known person, breaking a bad encryption algorithm, answering
> some hacker trivia questions ("drink all the booze, ______ all the
> things!"), exploiting a stack-based buffer overflow in a C program, and
> fixing a corrupt PNG image.
>
> It was lots of fun, and despite not spending a whole lot of time on it, we
> nabbed an appreciable number of flags. I'm looking forward to CSAW CTF
> 2014! :)
>
> -Alex
>
> _______________________________________________
> SkullSpace Discuss Mailing List
> Help: http://www.skullspace.ca/wiki/index.php/Mailing_List#Discuss
> Archive: https://groups.google.com/group/skullspace-discuss-archive/
>
_______________________________________________
SkullSpace Discuss Mailing List
Help: http://www.skullspace.ca/wiki/index.php/Mailing_List#Discuss
Archive: https://groups.google.com/group/skullspace-discuss-archive/

Reply via email to