<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>ChoKyuWon&apos;s Ark</title>
    <description>There&apos;s no flood, but I&apos;m awesome! Yeah!</description>
    <link>https://chokyuwon.github.io/</link>
    <atom:link href="https://chokyuwon.github.io/feed.xml" rel="self" type="application/rss+xml" />
    
      <item>
        <title>We can meet in the park</title>
        <description>
          CCE 2020 Qualification Writeup - 
          Use meet-in-the-middle attack. from Crypto.Cipher import AES import hashlib ENCRYPTED = b&apos;\xA5\xD1\xDB\x88\xFD\x34\xC6\x46\x0C\xF0\xC9\x55\x0F\xDB\x61\x9E\xB9\x17\xD7\x0B\xC8\x3D\xE5\x1B\x09\x71\xAE\x5F\x1C\xB5\xC7\x2C\xC5\x3F\x5A\xA7\xFB\xED\x63\xE6\xAD\x04\x0D\x16\xF6\x33\x16\x01&apos; memo1 = [] memo2 = [] def Check(buf, ml, cl): if ml != cl: for ch in range(0,100): buf[cl] = ch Check(buf, ml, cl+1) return for ch in range(0,100): buf[cl] = ch tmpBuf = bytes(buf) print(buf) aes1 =...
        </description>
        <pubDate>Tue, 06 Oct 2020 00:00:00 -0700</pubDate>
        <link>https://chokyuwon.github.io/2020-10-06-we_can_meet_in_the_park/</link>
        <guid isPermaLink="true">https://chokyuwon.github.io/2020-10-06-we_can_meet_in_the_park/</guid>
      </item>
    
      <item>
        <title>rev1</title>
        <description>
          Whitehat Grand Prix 06 Writeup - 
          rev1 Open the binary using IDA. It is 32bit executable. int __cdecl main(int argc, const char **argv, const char **envp){ v30 = fopen(&quot;data&quot;, &quot;rb&quot;); v29 = operator new[](0x3Cu); for ( i = 0; i &amp;lt;= 14; ++i ) *(_DWORD *)(4 * i + v29) = operator new[](0x1000u); for ( j...
        </description>
        <pubDate>Mon, 06 Jan 2020 00:00:00 -0800</pubDate>
        <link>https://chokyuwon.github.io/2020-01-06-WhitehatGrandPrixQuel_2019_rev1/</link>
        <guid isPermaLink="true">https://chokyuwon.github.io/2020-01-06-WhitehatGrandPrixQuel_2019_rev1/</guid>
      </item>
    
      <item>
        <title>Move or Not</title>
        <description>
          BambooFox CTF 2019 Writeup - 
          Move or Not use IDA to decompile it. __int64 __fastcall main(__int64 a1, char **a2, char **a3) { int v4; // [rsp+8h] [rbp-38h] int i; // [rsp+Ch] [rbp-34h] char s2; // [rsp+10h] [rbp-30h] unsigned __int64 v7; // [rsp+38h] [rbp-8h] v7 = __readfsqword(0x28u); i = 0; printf(&quot;First give me your password: &quot;,...
        </description>
        <pubDate>Thu, 02 Jan 2020 00:00:00 -0800</pubDate>
        <link>https://chokyuwon.github.io/2020-01-02-BambooFoxCTF_2019_Move_or_Not/</link>
        <guid isPermaLink="true">https://chokyuwon.github.io/2020-01-02-BambooFoxCTF_2019_Move_or_Not/</guid>
      </item>
    
      <item>
        <title>Web Crackme</title>
        <description>
          Inferno CTF 2019 Writeup - 
          In chrome developer tool, I can see it use WASM(WebAssembly.) The page’s script is like this: const wabtCompiler = WabtModule(); async function loadText(url) { let response = await fetch(url, {cache: &quot;no-cache&quot;}); let data = await response.text() return data; } methods: { async selectExample(example) { const wat = await Promise.all(loadText(example +...
        </description>
        <pubDate>Tue, 31 Dec 2019 00:00:00 -0800</pubDate>
        <link>https://chokyuwon.github.io/2019-12-31-InfernoCTF_2019_reversing_Web_Crackme/</link>
        <guid isPermaLink="true">https://chokyuwon.github.io/2019-12-31-InfernoCTF_2019_reversing_Web_Crackme/</guid>
      </item>
    
      <item>
        <title>Wannabe Rapper</title>
        <description>
          Inferno CTF 2019 Writeup - 
          In zip file, it contain 3 file with smali extend. It can easily convert to java bytecode. In MainActivity$1.smali, I can find main logic of username and password. .line 70 const-string v1, &quot;m&amp;amp;m&quot; invoke-virtual {p1, v1}, Ljava/lang/String;-&amp;gt;equals(Ljava/lang/Object;)Z move-result p1 we can find username on this code. Analyze bytecode, password is...
        </description>
        <pubDate>Tue, 31 Dec 2019 00:00:00 -0800</pubDate>
        <link>https://chokyuwon.github.io/2019-12-31-InfernoCTF_2019_reversing_Wannabe_Rapper/</link>
        <guid isPermaLink="true">https://chokyuwon.github.io/2019-12-31-InfernoCTF_2019_reversing_Wannabe_Rapper/</guid>
      </item>
    
      <item>
        <title>MrT4ntr4&apos;s Emco App</title>
        <description>
          Inferno CTF 2019 Writeup - 
          When I excute the file and attack debugger to it, I can find it was written by python. So I use python-exe-unpacker. There are so many package, but main logic is in emco file. emco has no signatue and extended, but I can simply read it by add signature on...
        </description>
        <pubDate>Tue, 31 Dec 2019 00:00:00 -0800</pubDate>
        <link>https://chokyuwon.github.io/2019-12-31-InfernoCTF_2019_reversing_MrT4ntr4's_EmCo_App/</link>
        <guid isPermaLink="true">https://chokyuwon.github.io/2019-12-31-InfernoCTF_2019_reversing_MrT4ntr4's_EmCo_App/</guid>
      </item>
    
  </channel>
</rss>
