Blog

Expertise gained during Capture The Flag competitions to support the security research community

BITSCTF 2017: fanfie

CTF: BITSCTF 2017 Points: 20 Category: Crypto Description Brute and get the base 32 format of flag. encrypted.txt: MZYVMIWLGBL7CIJOGJQVOA3IN5BLYC3NHI This task is worth 20 points, but only 8 teams have solved it during ctf and I really wonder why. Before

Read more ›

Read more

Veles release 2017.1

CodiSec’s development team is keeping up the pace! The next step on our journey towards our leading binary data analysis tool has been made – the next monthly release of Veles is now available (also on GitHub: https://github.com/codilime/veles). Main improvements include:

Read more ›

Read more

Binary visualization explained

Veles visualizations are purely statistical representations of binary data. We take a sequence of bytes and visualize correlations between certain values. It doesn’t matter if it’s an executable file, a picture or a disk image – from the perspective of

Read more ›

Read more

Binary data visualization

This page contains examples of Veles visualization. For explanation on how they actually work check out Binary visualization explained. By testing Veles visualizations on numerous files we found that different types of data look very differently. We can easily notice the differences

Read more ›

Read more

Personality

CTF: DefCamp CTF Finals 2016 Binary: dctf-2016-exp300 Libc: libc Points: 300 Category: PWN Description ssh user@server get flag TL;DR The program reads string from argv[1] and saves it in two structures on the heap. There is a buffer overflow vulnerability,

Read more ›

Tagged with:

Read more