TMUCTF 2021

Pwn

Warmup [50 pts]

Description

Just a simple warmup!

nc 194.5.207.56 7000, nc 185.239.107.54 7000

int main() {
  char local_58 [76];
  int local_c;
  
  setbuf(stdout,(char *)0x0);
  setbuf(stdin,(char *)0x0);
  setbuf(stderr,(char *)0x0);
  tmulogo();
  puts("Welcome to TMUCTF 2021! Let us know your name: ");
  local_c = 0;
  gets(local_58);
  puts("Thanks!\n");
  if (local_c != 0) {
    system("cat flag.txt");
  }
  return 0;
}

Solution

This is the first thing you learn when opening a book for reverse engineering/pwn. A buffer overflow to access the flag.

Flag: TMUCTF{??????}

Baby Pwn [50 pts]

Description

Can you get the flag?

nc 194.5.207.56 7010, nc 185.239.107.54 7010

Decompiled Code

Solution

This is a common warmup problem that appears in CTF so I went through it easily. Well sort of. I grabbed some past code and found in the source what I am doing. I did everything right except it wasn't printing out the flag. Later on, another member looked over it and found that my address was completely wrong and that was a simple fix was all it took. The Code is below.

Flag: TMUCTF{??????}

Are you admin [198 pts] [Not Solved]

Description

Just admin can get the flag! Note that the admin likes integers!

nc 194.5.207.113 7020, nc 185.97.117.19 7020

Solution

Welcome

Warmup [50 pts]

Description

A fun visual cryptography tool will amaze your kids!

Note: Remember the flag format is TMUCTF{...}.

111KB
Open
Image1
111KB
Open
Image2

Solution

Notice a small difference in the two file sizes. I was like hmmm let me see what would happen if I combine the images. I overlayed one on top of the other one and got the final image of the flag.

Flag: TMUCTF{W3_h0p3_y0u_3nj0y_7h15_c0mp371710n_4nd_7h4nk_y0u!}

Last updated

Was this helpful?