We received a capture network file named: re_crowd.pcapng
.
Notice that there are number of records with PROPFIND
:
This year I participated in Flare-On 7 (2020) and I wanted to share my thoughts about this great CTF.
The challenges were great this year, I learned a lot and they were pure reversing. For anyone wants to strength his reversing skills, flare-on is a great choice. This is like an intensive reversing course for six weeks that you will suffer and enjoy both together.
I separated my solutions into different pages to make it more readable:
Sometimes it happens, in my case, in CTF challenge - the day when you received an ELF binary but your host machine is Windows and your IDA+license is already installed on your host. One option is to install a free version of IDA on a virtual Linux machine but there is another option that sounds in the beginning complex, but actually it is not.
This option called “Remote Debugging”, the ability to debug a process from your host while it runs on a “remote” machine or in my case, virtual machine.
The scenario: We need to debug 32-bit ELF binary…
Security researcher interested in reversing, solving CTFs, malware analysis, penetration testing and DevOps security (docker and Kubernetes)