./dr3dd

  • AES-CBC bit flipping Attack

    n00b19CTF(Easy-Flipp, 100 pt) This is simple crypto challenge created by me. At the time of CTF, this challenge had zero solved. So, I thought to write a writeup for beginners to understand how CBC bit flipping works. AES-CBC Encryption and Decryption flow chart The main vulnerable part of CBC is...

  • Simple Shellcode Injection

    TUCTF18(Shelleasy, 345 pt) In this challange we have to overwrite variable to 0xdeadbeef and after that inject 32 bit shellcode to stack thats it. STEP-1 Binary protection and file type : dr3dd@dr3dd-Aspire-F5-573G  ~/ctf-2018/TUctf18/shelleasy  file shella-easy shella-easy: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter...

  • Simple Attack On AES-ECB Mode

    PicoCTF-18 (SpyFi ,300 pt) In this challange they use AES-ECB mode which we know it is quite vulnerable. If you dont know how AES-ECB works i would suggest to read about first. AES-ECB AES-ECB Encryption and Decryption flow chart Now come to the challange #!/usr/bin/python2 -u from Crypto.Cipher import AES...