Introduction
1.
Reverse Engineering
1.1.
Function Address
1.2.
Basic ASM
1.3.
Cyborg Secrets
1.4.
Towers of Toast
1.5.
Police Records
2.
Web Exploitation
2.1.
No Comment
2.2.
Internet Inspection
2.3.
Delicious
2.4.
Injection 1
2.5.
Potentially Hidden Password
2.6.
secure_page_service
2.7.
Make a Face
2.8.
Injection 2
2.9.
Injection 4
2.10.
Steve's List
3.
Cryptography
3.1.
Caesar
3.2.
The Valley of Fear
3.3.
ZOR
3.4.
Substitution
3.5.
Repeated XOR
3.6.
RSA
3.7.
ECC
3.8.
Low Entropy
3.9.
Block
3.10.
Web Interception
3.11.
Revenge of the Bleichenbacher
3.12.
RSA Mistakes
4.
Forensics
4.1.
Intercepted Post
4.2.
Snapcat
4.3.
PNG or Not?
4.4.
SSH Backdoor
5.
Binary Exploitation
5.1.
Overflow 1
5.2.
Overflow 2
5.3.
Format
5.4.
Guess
5.5.
Execute Me
5.6.
OBO
5.7.
ROP 1
6.
Miscellaneous
6.1.
Tyrannosaurus Hex
6.2.
OBO
Published using GitBook
A
A
Serif
Sans
White
Sepia
Night
Twitter
Google
Facebook
Weibo
Instapaper
PicoCTF 2014 Write-ups
Web Exploitation