The challenge description was: http://22.214.171.124:8089/ This web challenge was really easy, actually it was so easy that I think it wasn't meant to be that way. When you visit the link you are greeted with the following screen: Checking for SQL injection wasn't returning anything indicating it was what we had to do, so I checked the network traffic while trying to..[read more]
My name is Themistokle Benetatos and I enjoy programming and creating computer graphics.
I am also the co-founder of Monologue, a motion design studio based in Athens.
Latest blog posts
The challenge description was: This challenge is a follow up to FTP, now exploit the service. This is a follow-up challenge of: FTP Reversing writeup, this writeup will be terribly disappointing to many since most of the work has already been done in that first writeup. I have no clue if I had to exploit anything as the title suggested since I..[read more]
The challenge description was: We found an ftp service, I'm sure there's some way to log on to it. nc 126.96.36.199 12012 A binary file with the name ftp_0319deb1c1c033af28613c57da686aa7 was provided, let's have a look at it to get some informations: mrt:~/ctf/csaw/reverse/ftp$ file ftp_0319deb1c1c033af28613c57da686aa7 ftp_0319deb1c1c033af28613c57da686aa7: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=43afbcd9f4e163f002970b9e69309ce0f1902324, stripped mrt:~/ctf/csaw/reverse/ftp$ strings ftp_0319deb1c1c033af28613c57da686aa7 |..[read more]
The challenge description was: We're getting a transmission from someone in the past, find out what he wants. A NES ROM with the name HackingTime_03e852ace386388eb88c39a02f88c773.nes was provided. My friend SciFi actually told me about this challenge during the CTF while I was working on another one, he thought I would get excited and he was absolutely right. That was a really..[read more]