Skip to content

Commit

Permalink
📝 💊 Add authors of repo-local writeups for csaw-ctf-2015
Browse files Browse the repository at this point in the history
  • Loading branch information
YASME-Tim committed Feb 12, 2016
1 parent acd3ac6 commit 3161f10
Show file tree
Hide file tree
Showing 8 changed files with 16 additions and 0 deletions.
2 changes: 2 additions & 0 deletions csaw-ctf-2015/crypto/notesy-100/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,8 @@

## Write-up

by [x0w1](https://github.com/x0w1)

It's a simple substitution cypher. Since we have nothing to decrypt or encrypt, I decided to extract the key (encrypt the alphabet) and submit it as the flag, and it worked.

The flag:
Expand Down
2 changes: 2 additions & 0 deletions csaw-ctf-2015/crypto/zer0-day-50/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,8 @@

## Write-up

by [x0w1](https://github.com/x0w1)

It looks like a base64 encoded string with '\n' (two printable characters) instead of new lines. Simple one-liner

```bash
Expand Down
2 changes: 2 additions & 0 deletions csaw-ctf-2015/forensics/airport-200/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,8 @@

## Write-up

by [polym](https://github.com/abpolym)

This writeup is based on these writeups: [1](http://fadec0d3.blogspot.de/2015/09/csaw-2015-forensics-keep-calm-ctf-flash.html) [2](https://github.com/Alpackers/CTF-Writeups/tree/master/2015/CSAW-CTF/Forensics/airport) and [3](http://toh.necst.it/csaw2015/forensics/Airport/).

We are given four PNG pictures named `1.png` to `4.png` and one JPG named `steghide.jpg`.
Expand Down
2 changes: 2 additions & 0 deletions csaw-ctf-2015/forensics/flash-100/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,8 @@
## Write-up

by [polym](https://github.com/abpolym)

We are given an img that we can either mount or view with `FTK Imager`.

However, we can also apply `strings` to the image to get the flag:
Expand Down
2 changes: 2 additions & 0 deletions csaw-ctf-2015/forensics/keep-calm-and-ctf-100/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,8 @@

## Write-up

by [polym](https://github.com/abpolym)

We are given a `jpg`:

![](./img.jpg)
Expand Down
2 changes: 2 additions & 0 deletions csaw-ctf-2015/forensics/sharpturn-400/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,8 @@

## Write-up

by [PLWagner](https://github.com/PLWagner)

The git repo was crushed because of a material glitch. So the file sharp.cpp had some wrong inputs in it. To find the flag, start with:

```bash
Expand Down
2 changes: 2 additions & 0 deletions csaw-ctf-2015/forensics/transfer-100/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,8 @@
## Write-up

by [polym](https://github.com/abpolym)

We are given a pcap that we open with `wireshark`:

![](./wireshark.png)
Expand Down
2 changes: 2 additions & 0 deletions csaw-ctf-2015/pwn/precision-100/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,8 @@

## Write-up

by [polym](https://github.com/abpolym)

This writeup is loosely based on following writeups:

* <https://ctf-team.vulnhub.com/csaw-quals-2015-precision/>
Expand Down

0 comments on commit 3161f10

Please sign in to comment.