SECCON Online CTF 2015 - Exec dmesg
06 December 2015 by sku- Download and extract archive to get
core-current.iso
- Run it in qemu:
$ qemu-system-x86_64 -cdrom core-current.iso -boot d
- Launch gdb, attach to the qemu process
- Search memory for
SECCON
- Get flag:
SECCON{elf32-i386}
# gdb /usr/bin/qemu-system-x86_64
gdb-peda$ ps -e | grep qemu
gdb-peda$ attach 1246
gdb-peda$ find 'SECCON'
Searching for 'SECCON' in: None ranges
Found 3 results, display max 3 items:
mapped : 0x7f10c4606c68 ("SECCON{%s}")
mapped : 0x7f10c473de84 ("SECCON{elf32-i386}")
mapped : 0x7f10cb03c1a4 --> 0x4e4f43434553 ('SECCON')
gdb-peda$ q
SECCON Online CTF 2015 - Reverse-Engineering Android APK 2
06 December 2015
by sku
Writeup for the reverse engineering and web exploitation challenge APK 2.
read more