[13 Apr 2014 | No Comment | ]
The blog’s heart’s beating is normal now

So yeah the ZOMGWTFAPOCALYPTIC bug affected this blog too.

I had a very busy couple of weeks and traveled to Cairo to attend OWASP cairo chapter launch meeting. so i had no time or brains to fix it that time but i disabled SSL.
Today i updated the openssl and libssl to the latest version in the repo and BAZINGA! i am no longer affected.

Reissued the (self-signed) certificates and put the VirtualHost back to apache’s config and restarted. and no more leaking (I hope)

Read the full story »


[25 Jul 2015 | No Comment | ]

Hello, world.
So I was in this CTF competition and my teammate (@aboul3la) found a command injection vulnerability in one of web application challenges.
If you input `>file.txt` the server creates a file called file.txt.
We wanted to write a PHP shell to the server (echo “<?PHP CODE>” > file.php)
But the thing is, the challenge had a filter that won’t allow you to have a space in the input (Error: Not valid URL)
So we tried around and my first thought was to use some decoding mechanism to decrypt “space” from it’s hex equivalent …

Tutorials »

[14 Mar 2015 | No Comment | ]

On Linux Mint XFCE.
Rarely when i double click the VLC video playing, it won’t go fully fullscreen – it occupies the whole screen except of the task bar menu.
The solution is a no-brainer actually. The VLC windows is maxmized. So simple click the maximize button again and you can now go full screen.


[24 Jan 2015 | No Comment | ]

The last word (crypto200)
Description: Decrypt this
And attachment is supplied: challenge.txt
It looks hex’ish? so i try hex decoding with no luck.
Then i noticed it had too many zeros? so i tried to change every character that’s not 0 to 1 to try for binary.
So as usual i run to python: cry200.py
That decodes to:
bui xdit mk lpr rsem bj wvqgsj-av-plawn bj Oasvpwssf awtavxw INESS
And from the look of it it looks like some kind of substitution cipher:
I tried rot-n, with no luck.
Also i tried simple Caesar without luck.
Then i tried Vigenère cipher …


[24 Jan 2015 | No Comment | ]

OHSHIT (crypto100)
Description: Decrypt the cipher using the encryption program
And attachment is supplied: challenge.7z
It contains an encryption program and crypto.txt containing

Name: Automated Crypter
Decrypt this:
Using this program.
(Note: the – is just a separator)
Hint: Not all letters chars are crypted

I didn’t have to solve this using a python script as usual.
I tried it manually:
./crypto abcdefghijklmnopqrstuvwxyz
Crypted text: 1b3f4g5i8j12n13o16q19t22u25z
Crypted text: 01b03f04g05i08j012n013o016q019t022u025z
I notice something, the character is encrypted to number+character after it
The encryption of “s” is “19t”
So just manually i know “019t” is 0+s.
And with trial and error i get:
But the 0’s don’t feel right.
So …


[24 Jan 2015 | No Comment | ]

Weird Text (misc100)
Description: Giv m th flg plz !
Part of the supplied file was:




And it looked like it could be flag{STUFF_HERE}
So if you guess that “______ ____________ _ _______” was flag.
It’s easy to know the obfuscation used.
6 = f
12= l
1 = a
7 = g
It’s obvious it’s using charset of abcdefghijklmnopqrstuvwxyz
So i wrote a little script to parse it and give the solution.
Although doing it by hand would have been feasible too, it’s not long.