IlyarBSides 2020 — snappaste (1) explainedThis is the first challange of two (pwn challanges) named snappate. They can be found at…Dec 28, 2020Dec 28, 2020
IlyarKAF 2020–8Byte (Reversing manually a small VM) — part 2Remember some_calc (this is not the real name. It was given by me when reversing)? Well, it basically a serious of functions that unpack…Nov 21, 2020Nov 21, 2020
IlyarKAF 2020–8Byte (Reversing manually a small VM) — part 1I didn’t solve this one during the challenge, but because 39 people did solve it, I had the urge to try also. It’s a 32bit PE binary. I…Nov 21, 2020Nov 21, 2020
Ilyarpwnable.kr — md5 calculatorI didn’t find any detailed writeup for this one & I have a spare time. Let’s go. As with any challenge, we are presented with a binary…Nov 14, 2020Nov 14, 2020
IlyarKipodAfterFree(KAF) CTF 2020 — SSE_KEYGENMEThis one can be solved with a few lines using anger, but we are here to solve it as the writer wanted. This is a a regular elf x64 binary…Nov 14, 2020Nov 14, 2020
IlyarMicrocorruption — Algiers (without understanding the heap structure)Hello again. This one is a heap exploitation level. I actually solved it without getting into the fascinating heap structure, but you…Sep 23, 2020Sep 23, 2020
IlyarMicrocorruption — novosibirsk (an elegant solution)I have seen that most of the solutions use a very long shellcode. I had a different approach to this challenge. In short, this level has a…Sep 23, 2020Sep 23, 2020
IlyarReversing Hero Challenge #6We begin as always by statically analyzing the program (I used IDA free so the function names are as follows). In the beginning, the…Apr 11, 2020Apr 11, 2020
IlyarReversing Hero Challenge #5This time I worked with IDA (free) because Cutter has some problems the recent versions.Apr 6, 2020Apr 6, 2020
IlyarReversing Hero Challenge #4We open the x4 binary and can see clearly that there are no mentioned functions. That is because our binary is stripped from symbols. We…Mar 30, 2020Mar 30, 2020