The challenge description was: See if you can pop this calc. Running at calcpop-4gh07blg.9447.plumbing port 9447 A binary file with the name calcpop was provided: mrt:~/ctf/9447-15/exploit/calcpop$ file calcpop calcpop: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.24, BuildID[sha1]=3b0773c4d23785ef3daae0b3a3505d8fa41403af, not stripped mrt:~/ctf/9447-15/exploit/calcpop$ strings calcpop /lib/ld-linux.so.2 libc.so.6 ... Welcome to calc.exe help Type 'exit' to exit. exit Exiting... %d + %d = %d Type two numbers and I will calculate..[read more]
My name is Themistokle Benetatos and I enjoy programming and creating computer graphics.
I am also the co-founder of Monologue, a motion design studio based in Athens.
Latest blog posts
The challenge description was: http://126.96.36.199:8089/ This web challenge was really easy, actually it was so easy that I think it wasn't meant to be that way. When you visit the link you are greeted with the following screen: Checking for SQL injection wasn't returning anything indicating it was what we had to do, so I checked the network traffic while trying to..[read more]
The challenge description was: This challenge is a follow up to FTP, now exploit the service. This is a follow-up challenge of: FTP Reversing writeup, this writeup will be terribly disappointing to many since most of the work has already been done in that first writeup. I have no clue if I had to exploit anything as the title suggested since I..[read more]
The challenge description was: We found an ftp service, I'm sure there's some way to log on to it. nc 188.8.131.52 12012 A binary file with the name ftp_0319deb1c1c033af28613c57da686aa7 was provided, let's have a look at it to get some informations: mrt:~/ctf/csaw/reverse/ftp$ file ftp_0319deb1c1c033af28613c57da686aa7 ftp_0319deb1c1c033af28613c57da686aa7: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=43afbcd9f4e163f002970b9e69309ce0f1902324, stripped mrt:~/ctf/csaw/reverse/ftp$ strings ftp_0319deb1c1c033af28613c57da686aa7 |..[read more]