TMUCTF 2021
Pwn
Warmup [50 pts]
Description
Just a simple warmup!
nc 194.5.207.56 7000, nc 185.239.107.54 7000
int main() {
char local_58 [76];
int local_c;
setbuf(stdout,(char *)0x0);
setbuf(stdin,(char *)0x0);
setbuf(stderr,(char *)0x0);
tmulogo();
puts("Welcome to TMUCTF 2021! Let us know your name: ");
local_c = 0;
gets(local_58);
puts("Thanks!\n");
if (local_c != 0) {
system("cat flag.txt");
}
return 0;
}Solution
This is the first thing you learn when opening a book for reverse engineering/pwn. A buffer overflow to access the flag.
Flag: TMUCTF{??????}
Baby Pwn [50 pts]
Description
Can you get the flag?
nc 194.5.207.56 7010, nc 185.239.107.54 7010
Decompiled Code
Solution
This is a common warmup problem that appears in CTF so I went through it easily. Well sort of. I grabbed some past code and found in the source what I am doing. I did everything right except it wasn't printing out the flag. Later on, another member looked over it and found that my address was completely wrong and that was a simple fix was all it took. The Code is below.
Flag: TMUCTF{??????}
Are you admin [198 pts] [Not Solved]
Description
Just admin can get the flag! Note that the admin likes integers!
nc 194.5.207.113 7020, nc 185.97.117.19 7020
Solution
Welcome
Warmup [50 pts]
Description
A fun visual cryptography tool will amaze your kids!
Note: Remember the flag format is TMUCTF{...}.
Solution
Notice a small difference in the two file sizes. I was like hmmm let me see what would happen if I combine the images. I overlayed one on top of the other one and got the final image of the flag.

Flag: TMUCTF{W3_h0p3_y0u_3nj0y_7h15_c0mp371710n_4nd_7h4nk_y0u!}
Last updated
Was this helpful?