Creating a Hacking Game - Part 1: Introduction

This is a multi-part blog post about creating my own hacking game to teach other people the excitement of exploiting vulnerabilities. To try it out, just connect to ssh level0@gracker.org with password level0. You only need a little bit of Linux command line knowledge. And get used to ...

more ...



CrossedCaptcha

First of all, this research is legit because I have a logo and a name for it. This seems to be a trend right now (heartbleed, shellshock, sandworm) . Afaik the rule is that you must invest the same time into creating the logo as you did in your research.

Creating ...

more ...

Code Archeology (Updated)

One day I thought about different techniques to do source code analysis. Especially since we often have access to repositories and thus the evolution of code.

Wouldn't it be cool to see the age of certain lines of code relatively to others? So I decided to create a PoC ...

more ...

HITCON CTF 2014 - sha1lcode

Crosspost: http://krebsco.de/writeups/sha1lcode.html

The name of the challange sha1lcode already hints on the overall idea - writing shellcode that has something todo with sha1 hashes.

So let's have a first look at the provided binary file:

$ file sha1lcode-5b43cc13b0fb249726e0ae175dbef3fe
sha1lcode-5b43cc13b0fb249726e0ae175dbef3fe: ELF 64-bit ...
more ...